An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.04.2-01be-daa4
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.04.2-01be-daa4
Open sidebar
Navigate
Top
Search
Checks (
136
)
Print
Changes
Pages (
9/10
)
Oracle Database 12c STIG
Oracle Database 12c Security Technical Implementation Guide
v3 r3 (Released Jan. 30, 2025)
v3 r2 (Released Oct. 24, 2024)
v3 r1 (Released July 24, 2024)
v2 r9 (Released Jan. 24, 2024)
v2 r8 (Released July 26, 2023)
v2 r7 (Released April 27, 2023)
v2 r6 (Released Jan. 26, 2023)
v2 r5 (Released July 27, 2022)
v2 r4 (Released April 27, 2022)
v2 r3 (Released Jan. 27, 2022)
v2 r2 (Released Oct. 27, 2021)
v2 r1 (Released April 23, 2021)
v1 r18 (Released July 24, 2020)
v1 r17 (Released April 24, 2020)
v1 r16 (Released Jan. 24, 2020)
v1 r15 (Released Oct. 25, 2019)
v1 r14 (Released Aug. 23, 2019)
v1 r13 (Released July 26, 2019)
v1 r12 (Released Jan. 25, 2019)
v1 r11 (Released Oct. 26, 2018)
v1 r10 (Released April 27, 2018)
v1 r9 (Released Jan. 26, 2018)
v1 r8 (Released July 28, 2017)
v1 r7 (Released April 28, 2017)
v1 r6 (Released Jan. 27, 2017)
ID
Vuln ID
Title
Cat
Status
O121-C2-019900
V-220301
The DBMS must only generate error messages that provide information necessary for corrective actions without revealing organization-defined sensitive or potentially harmful information in error logs and administrative messages that could be exploited.
Cat II
O121-C2-020000
V-220302
The DBMS must restrict error messages so only authorized personnel may view them.
Cat II
O121-N1-015601
V-220303
Applications must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
Cat I
O121-N1-015602
V-220304
When using command-line tools such as Oracle SQL*Plus, which can accept a plain-text password, users must use an alternative logon method that does not expose the password.
Cat I
O121-N2-008601
V-220305
The DBMS must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
Cat II
O121-OS-004600
V-237745
Use of the DBMS software installation account must be restricted.
Cat I
O121-OS-010700
V-220306
Database software, applications, and configuration files must be monitored to discover unauthorized changes.
Cat II
O121-OS-010710
V-220307
Logic modules within the database (to include packages, procedures, functions and triggers) must be monitored to discover unauthorized changes.
Cat II
O121-OS-011200
V-237746
The OS must limit privileges to change the DBMS software resident within software libraries (including privileged programs).
Cat II
O121-P2-008100
V-237747
Oracle Database must off-load audit data to a separate log management facility; this must be continuous and in near-real-time for systems with a network connection to the storage facility, and weekly or more often for stand-alone systems.
Cat II
O121-P2-010800
V-220308
The DBMS software installation account must be restricted to authorized users.
Cat I
O121-P2-010900
V-220309
Database software directories, including DBMS configuration files, must be stored in dedicated directories, or DASD pools, separate from the host OS and other applications.
Cat II
O121-P2-012800
V-220310
The DBMS must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
Cat II
O121-P2-015800
V-220311
The DBMS must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).
Cat II
O121-P2-017300
V-220312
The DBMS must separate user functionality (including user interface services) from database management functionality.
Cat II
Prev
1...
5
6
7
8
9
10
Next
Print
Display this benchmark in a printer-friendly format for off-line reference. This display does not include any commands.
Version Changes
If there are multiple versions of this benchmark, Xylok can display the differences between any changes in the checks.