O121-C2-011000 - Database objects must be owned by accounts authorized for ownership.

Information

Within the database, object ownership implies full privileges to the owned object including the privilege to assign access to the owned objects to other subjects. Unmanaged or uncontrolled ownership of objects can lead to unauthorized object grants and alterations, and unauthorized modifications to data.

If critical tables or other objects rely on unauthorized owner accounts, these objects can be lost when an account is removed.

It may be the case that there are accounts that are authorized to own synonyms, but no other objects. If this is so, it should be documented.

Solution

Update system documentation to include list of accounts authorized for object ownership.

Re-assign ownership of authorized objects to authorized object owner accounts.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Database_12c_V3R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-5(6), CAT|II, CCI|CCI-001499, Rule-ID|SV-220283r960960_rule, STIG-ID|O121-C2-011000, STIG-Legacy|SV-76163, STIG-Legacy|V-61673, Vuln-ID|V-220283

Plugin: OracleDB

Control ID: 9be11fd76e23e0d058e7741e1d2f354d37b995461e9701de74ad3f3fe882b59d