An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.04.2-01be-daa4
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.04.2-01be-daa4
Open sidebar
Navigate
Top
Search
Checks (
136
)
Print
Changes
Pages (
6/10
)
Oracle Database 12c STIG
Oracle Database 12c Security Technical Implementation Guide
v3 r3 (Released Jan. 30, 2025)
v3 r2 (Released Oct. 24, 2024)
v3 r1 (Released July 24, 2024)
v2 r9 (Released Jan. 24, 2024)
v2 r8 (Released July 26, 2023)
v2 r7 (Released April 27, 2023)
v2 r6 (Released Jan. 26, 2023)
v2 r5 (Released July 27, 2022)
v2 r4 (Released April 27, 2022)
v2 r3 (Released Jan. 27, 2022)
v2 r2 (Released Oct. 27, 2021)
v2 r1 (Released April 23, 2021)
v1 r18 (Released July 24, 2020)
v1 r17 (Released April 24, 2020)
v1 r16 (Released Jan. 24, 2020)
v1 r15 (Released Oct. 25, 2019)
v1 r14 (Released Aug. 23, 2019)
v1 r13 (Released July 26, 2019)
v1 r12 (Released Jan. 25, 2019)
v1 r11 (Released Oct. 26, 2018)
v1 r10 (Released April 27, 2018)
v1 r9 (Released Jan. 26, 2018)
v1 r8 (Released July 28, 2017)
v1 r7 (Released April 28, 2017)
v1 r6 (Released Jan. 27, 2017)
ID
Vuln ID
Title
Cat
Status
O121-C2-009400
V-220278
The system must protect audit information from unauthorized modification.
Cat II
O121-C2-009500
V-220279
The system must protect audit information from unauthorized deletion.
Cat II
O121-C2-009600
V-220280
The system must protect audit tools from unauthorized access.
Cat II
O121-C2-009700
V-220281
The system must protect audit tools from unauthorized modification.
Cat II
O121-C2-009800
V-220282
The system must protect audit tools from unauthorized deletion.
Cat II
O121-C2-010300
V-237719
The DBMS must support enforcement of logical access restrictions associated with changes to the DBMS configuration and to the database itself.
Cat II
O121-C2-011000
V-220283
Database objects must be owned by accounts authorized for ownership.
Cat II
O121-C2-011500
V-220284
Default demonstration and sample databases, database objects, and applications must be removed.
Cat II
O121-C2-011600
V-220285
Unused database components, DBMS software, and database objects must be removed.
Cat II
O121-C2-011700
V-220286
Unused database components that are integrated in the DBMS and cannot be uninstalled must be disabled.
Cat II
O121-C2-011800
V-220287
Use of external executables must be authorized.
Cat II
O121-C2-011810
V-220288
Access to external executables must be disabled or restricted.
Cat II
O121-C2-011900
V-220289
The DBMS must support the organizational requirements to specifically prohibit or restrict the use of unauthorized functions, ports, protocols, and/or services.
Cat II
O121-C2-012300
V-237720
Database backup procedures must be defined, documented, and implemented.
Cat II
O121-C2-012400
V-237721
Database recovery procedures must be developed, documented, implemented, and periodically tested.
Cat II
Prev
1...
2
3
4
5
6
7
8
9
10
Next
Print
Display this benchmark in a printer-friendly format for off-line reference. This display does not include any commands.
Version Changes
If there are multiple versions of this benchmark, Xylok can display the differences between any changes in the checks.