Item Search

NameAudit NamePluginCategory
DG0007-ORACLE11 - The database should be secured in accordance with DoD, vendor and/or commercially accepted practices where applicable.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0007-ORACLE11 - The database should be secured in accordance with DoD, vendor and/or commercially accepted practices where applicable.DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DG0021-ORACLE11 - A baseline of database application software should be documented and maintained.DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DG0030-ORACLE11 - Audit trail data should be retained for one year.DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DG0041-ORACLE11 - Use of the DBMS installation account should be logged.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0042-ORACLE11 - Use of the DBMS software installation account should be restricted to DBMS software installation, upgrade and maintenance actions.DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DG0051-ORACLE11 - Database job/batch queues should be reviewed regularly to detect unauthorized database job submissions - 'job_queue_processes limit is set'DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DG0051-ORACLE11 - Database job/batch queues should be reviewed regularly to detect unauthorized database job submissions - 'No unknown jobs exist in the dba_jobs queue'DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DG0051-ORACLE11 - Database job/batch queues should be reviewed regularly to detect unauthorized database job submissions - 'No unknown jobs exist in the dba_scheduler_jobs queue'DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DG0053-ORACLE11 - A single database connection configuration file should not be used to configure all database clients.DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DG0063-ORACLE11 - DBMS privileges to restore database data or other DBMS configurations, features, or objects should be restricted to authorized DBMS accounts.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0066-ORACLE11 - Procedures for establishing temporary passwords that meet DoD password requirements for new accounts should be defined, documented and implemented.DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DG0068-ORACLE11 - DBMS tools or applications that echo or require a password entry in clear text should be protected from password display.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0076-ORACLE11 - Sensitive information from production database exports must be modified before import to a development database.DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DG0080-ORACLE11 - Application user privilege assignment should be reviewed monthly or more frequently to ensure compliance with least privilege and documented policy.DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DG0090-ORACLE11 - Sensitive information stored in the database should be protected by encryption.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0092-ORACLE11 - Database data files containing sensitive information should be encrypted.DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DG0095-ORACLE11 - Audit trail data should be reviewed daily or more frequently.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0101-ORACLE11 - OS accounts used to execute external procedures should be assigned minimum privileges.DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DG0105-ORACLE11 - DBMS application user roles should not be assigned unauthorized privileges.DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DG0106-ORACLE11 - Database data encryption controls should be configured in accordance with application requirements.DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DG0115-ORACLE11 - Recovery procedures and technical system features exist to ensure that recovery is done in a secure and verifiable manner.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0115-ORACLE11 - Recovery procedures and technical system features exist to ensure that recovery is done in a secure and verifiable manner.DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DG0118-ORACLE11 - The IAM should review changes to DBA role assignments.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0120-ORACLE11 - Unauthorized access to external database objects should be removed from application user roles.DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DG0122-ORACLE11 - Access to sensitive data should be restricted to authorized users identified by the Information Owner - 'spfile'DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DG0133-ORACLE11 - Unlimited account lock times should be specified for locked accounts.DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DG0138-ORACLE11 - Access grants to sensitive data should be restricted to authorized user roles.DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DG0155-ORACLE11 - The DBMS should have configured all applicable settings to use trusted files, functions, features, or other components during startup, shutdown, aborts, or other unplanned interruptions.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0171-ORACLE11 - The DBMS should not have a connection defined to access or be accessed by a DBMS at a different classification level.DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DG0176-ORACLE11 - The DBMS audit logs should be included in backup operations.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0186-ORACLE11 - The database should not be directly accessible from public or unauthorized networks.DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DG0186-ORACLE11 - The database should not be directly accessible from public or unauthorized networks.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0194-ORACLE11 - Privileges assigned to developers on shared production and development DBMS hosts and the DBMS should be monitored every three months or more frequently for unauthorized changes.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG7001-ORACLE11 - The directory assigned to the AUDIT_FILE_DEST parameter must be protected from unauthorized access and must be stored in a dedicated directory or disk partition separate from software or other application files.DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DO0140-ORACLE11 - Access to the Oracle SYS and SYSTEM accounts should be restricted to authorized DBAs.DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DO0155-ORACLE11 - Only authorized system accounts should have the SYSTEM tablespace specified as the default tablespace - 'Tablespace not set to SYSTEM'DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DO0210-ORACLE11 - Access to default accounts used to support replication should be restricted to authorized DBAs - 'No replication objects exist'DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DO0220-ORACLE11 - Oracle instance names should not contain Oracle version numbers.DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DO0231-ORACLE11 - Application owner accounts should have a dedicated application tablespace.DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DO0234-ORACLE11 - The directory assigned to the AUDIT_FILE_DEST parameter should be protected from unauthorized access - 'audit_trail value = TRUE, OS, XML or XML, EXTENDED'DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DO0243-ORACLE11 - The Oracle _TRACE_FILES_PUBLIC parameter if present should be set to FALSE - '_trace_files_public = false'DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DO0250-ORACLE11 - Fixed user and public database links should be authorized for use - 'Database links are documented'DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DO0360-ORACLE11 - Connections by mid-tier web and application systems to the Oracle DBMS should be protected, encrypted and authenticated according to database, web, application, enclave and network requirements.DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DO3440-ORACLE11 - The DBA role should not be granted to unauthorized user accounts - 'No unauthorized DBA accounts exist'DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
DO5037-ORACLE11 - Oracle SQLNet and listener log files should not be accessible to unauthorized users - 'TRACE_LEVEL_SERVER'DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DO5037-ORACLE11 - Oracle SQLNet and listener log files should not be accessible to unauthorized users - 'TRACE_LEVEL_SERVER'DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DO6750-ORACLE11 - The Oracle SEC_PROTOCOL_ERROR_FURTHER_ACTION parameter should be set to a value of DELAY or DROP - 'sec_protocol_error_further_action = drop or delay'DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
WA000-WWA062 A22 - The HTTP request header fields must be limited.DISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix
WA000-WWA066 A22 - The HTTP request line must be limited.DISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix