STIGQter STIGQter: STIG Summary: Oracle Database 11g Instance STIG Version: 8 Release: 20 Benchmark Date: 28 Jul 2017:

Unapproved inactive or expired database accounts should not be found on the database.

DISA Rule

SV-24652r1_rule

Vulnerability Number

V-15130

Group Title

DBMS inactive accounts

Rule Version

DG0074-ORACLE11

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Develop, document and implement procedures to monitor database accounts for inactivity and account expiration.

Investigate and re-authorize or delete [if appropriate] any accounts that are expired or have been inactive for more than 30 days.

Where appropriate, protect authorized expired or inactive accounts by disabling them or applying some other similar protection.

NOTE: Password and account requirements have changed for DoD since this STIG requirement was published.

Check Contents

Review procedures and implementation for monitoring the DBMS for account expiration and account inactivity.

Verify implemented procedures are in place to address expired/locked accounts not required for system/application operation are authorized to remain and are documented.

Verify implemented procedures are in place to address accounts that are unlocked and have been inactive in excess of 30 days are authorized to remain unlocked.

Verify implemented procedures are in place to address unauthorized, inactive accounts after 30 days are expired and locked.

Verify implemented procedures are in place to address expired/locked accounts that are not authorized to remain are dropped/removed/deleted.

A finding for this check would be based on insufficient documentation and implemented procedures for monitoring DBMS accounts.

Vulnerability Number

V-15130

Documentable

False

Rule Version

DG0074-ORACLE11

Severity Override Guidance

Review procedures and implementation for monitoring the DBMS for account expiration and account inactivity.

Verify implemented procedures are in place to address expired/locked accounts not required for system/application operation are authorized to remain and are documented.

Verify implemented procedures are in place to address accounts that are unlocked and have been inactive in excess of 30 days are authorized to remain unlocked.

Verify implemented procedures are in place to address unauthorized, inactive accounts after 30 days are expired and locked.

Verify implemented procedures are in place to address expired/locked accounts that are not authorized to remain are dropped/removed/deleted.

A finding for this check would be based on insufficient documentation and implemented procedures for monitoring DBMS accounts.

Check Content Reference

I

Responsibility

Database Administrator

Target Key

1367

Comments