An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.04.2-01be-daa4
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.04.2-01be-daa4
Open sidebar
Navigate
Top
Search
Checks (
136
)
Print
Changes
Pages (
7/10
)
Oracle Database 12c STIG
Oracle Database 12c Security Technical Implementation Guide
v3 r3 (Released Jan. 30, 2025)
v3 r2 (Released Oct. 24, 2024)
v3 r1 (Released July 24, 2024)
v2 r9 (Released Jan. 24, 2024)
v2 r8 (Released July 26, 2023)
v2 r7 (Released April 27, 2023)
v2 r6 (Released Jan. 26, 2023)
v2 r5 (Released July 27, 2022)
v2 r4 (Released April 27, 2022)
v2 r3 (Released Jan. 27, 2022)
v2 r2 (Released Oct. 27, 2021)
v2 r1 (Released April 23, 2021)
v1 r18 (Released July 24, 2020)
v1 r17 (Released April 24, 2020)
v1 r16 (Released Jan. 24, 2020)
v1 r15 (Released Oct. 25, 2019)
v1 r14 (Released Aug. 23, 2019)
v1 r13 (Released July 26, 2019)
v1 r12 (Released Jan. 25, 2019)
v1 r11 (Released Oct. 26, 2018)
v1 r10 (Released April 27, 2018)
v1 r9 (Released Jan. 26, 2018)
v1 r8 (Released July 28, 2017)
v1 r7 (Released April 28, 2017)
v1 r6 (Released Jan. 27, 2017)
ID
Vuln ID
Title
Cat
Status
O121-C2-012500
V-237722
DBMS backup and restoration files must be protected from unauthorized access.
Cat II
O121-C2-012900
V-237723
The DBMS must use multifactor authentication for access to user accounts.
Cat I
O121-C2-013300
V-237724
The DBMS must ensure users are authenticated with an individual authenticator prior to using a shared authenticator.
Cat II
O121-C2-013800
V-237725
The DBMS must disable user accounts after 35 days of inactivity.
Cat II
O121-C2-013900
V-237726
The DBMS must support organizational requirements to enforce minimum password length.
Cat II
O121-C2-014000
V-237727
The DBMS must support organizational requirements to prohibit password reuse for the organization-defined number of generations.
Cat II
O121-C2-014100
V-237728
The DBMS must support organizational requirements to enforce password complexity by the number of uppercase characters used.
Cat II
O121-C2-014200
V-237729
The DBMS must support organizational requirements to enforce password complexity by the number of lowercase characters used.
Cat II
O121-C2-014300
V-237730
The DBMS must support organizational requirements to enforce password complexity by the number of numeric characters used.
Cat II
O121-C2-014400
V-237731
The DBMS must support organizational requirements to enforce password complexity by the number of special characters used.
Cat II
O121-C2-014500
V-237732
The DBMS must support organizational requirements to enforce the number of characters that get changed when passwords are changed.
Cat II
O121-C2-014600
V-220290
The DBMS must support organizational requirements to enforce password encryption for storage.
Cat I
O121-C2-014900
V-237733
Procedures for establishing temporary passwords that meet DOD password requirements for new accounts must be defined, documented, and implemented.
Cat II
O121-C2-015100
V-237734
DBMS passwords must not be stored in compiled, encoded, or encrypted batch jobs or compiled, encoded, or encrypted application source code.
Cat II
O121-C2-015200
V-237735
The DBMS must enforce password maximum lifetime restrictions.
Cat II
Prev
1...
3
4
5
6
7
8
9
10
Next
Print
Display this benchmark in a printer-friendly format for off-line reference. This display does not include any commands.
Version Changes
If there are multiple versions of this benchmark, Xylok can display the differences between any changes in the checks.