STIGQter STIGQter: STIG Summary: Oracle Database 11.2g Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Apr 2021:

The DBMS must verify there have not been unauthorized changes to the DBMS software and information.

DISA Rule

SV-238478r667608_rule

Vulnerability Number

V-238478

Group Title

SRG-APP-000133-DB-000179

Rule Version

O112-C2-019600

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Utilize a DBMS, OS, or third-party product to perform file verification of DBMS system file integrity at startup and shutdown.

(Using Oracle Configuration Manager with Enterprise Manager, configured to perform this verification, is one possible way of satisfying this requirement.)

Check Contents

Verify the DBMS system initialization and shutdowns are configured to ensure the DBMS system and data files remain in a secure state. If the DBMS does not support this, verify third-party software or custom scripting at the OS level performs this function. If neither the DBMS, a third-party application, nor the OS is performing integrity verification of DBMS system files, this is a finding.

Vulnerability Number

V-238478

Documentable

False

Rule Version

O112-C2-019600

Severity Override Guidance

Verify the DBMS system initialization and shutdowns are configured to ensure the DBMS system and data files remain in a secure state. If the DBMS does not support this, verify third-party software or custom scripting at the OS level performs this function. If neither the DBMS, a third-party application, nor the OS is performing integrity verification of DBMS system files, this is a finding.

Check Content Reference

M

Target Key

4057

Comments