STIGQter STIGQter: STIG Summary: Oracle Database 11.2g Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Apr 2021:

Database software, applications, and configuration files must be monitored to discover unauthorized changes.

DISA Rule

SV-219790r395850_rule

Vulnerability Number

V-219790

Group Title

SRG-APP-000133-DB-000179

Rule Version

O112-OS-010700

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Implement procedures to monitor for unauthorized changes to DBMS software libraries, related software application libraries, and configuration files. If a third-party automated tool is not employed, an automated job that reports file information on the directories and files of interest and compares them to the baseline report for the same will meet the requirement.

File hashes or checksums should be used for comparisons since file dates may be manipulated by malicious users.

Check Contents

Review monitoring procedures and implementation evidence to verify that monitoring of changes to database software libraries, related applications, and configuration files is done.

Verify that the list of files and directories being monitored is complete. If monitoring does not occur or is not complete, this is a finding.

Vulnerability Number

V-219790

Documentable

False

Rule Version

O112-OS-010700

Severity Override Guidance

Review monitoring procedures and implementation evidence to verify that monitoring of changes to database software libraries, related applications, and configuration files is done.

Verify that the list of files and directories being monitored is complete. If monitoring does not occur or is not complete, this is a finding.

Check Content Reference

M

Target Key

4057

Comments