STIGQter STIGQter: STIG Summary: Oracle HTTP Server 12.1.3 Security Technical Implementation Guide Version: 1 Release: 6 Benchmark Date: 24 Jan 2020: The log information from OHS must be protected from unauthorized modification.

DISA Rule

SV-78727r1_rule

Vulnerability Number

V-64237

Group Title

SRG-APP-000119-WSR-000069

Rule Version

OH12-1X-000075

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

1. Change to the ORACLE_HOME/user_projects/domains/base_domain/servers directory.

2. Execute the command: find . -name *.log

3. Set the owner and group to the user and group used to run the web server. The user and group are typically set to Oracle.

4. Set the permissions on all the log files returned to "640".

Check Contents

1. Change to the ORACLE_HOME/user_projects/domains/base_domain/servers directory.

2. Execute the command: find . -name *.log

3. Verify that each log file that was returned has the owner and group set to the user and group used to run the web server. The user and group are typically set to Oracle.

4. Verify that each log file that was returned has the permissions on the log file set to "640" or more restrictive.

If the owner, group or permissions are set incorrectly on any of the log files, this is a finding.

Vulnerability Number

V-64237

Documentable

False

Rule Version

OH12-1X-000075

Severity Override Guidance

1. Change to the ORACLE_HOME/user_projects/domains/base_domain/servers directory.

2. Execute the command: find . -name *.log

3. Verify that each log file that was returned has the owner and group set to the user and group used to run the web server. The user and group are typically set to Oracle.

4. Verify that each log file that was returned has the permissions on the log file set to "640" or more restrictive.

If the owner, group or permissions are set incorrectly on any of the log files, this is a finding.

Check Content Reference

M

Target Key

2753

Comments