SV-219709r401224_rule
V-219709
SRG-APP-000516-DB-000363
O112-BP-022600
CAT II
10
Revoke any privileges granted to PUBLIC for objects that are not owned by Oracle product accounts.
From SQL*Plus:
revoke [privilege name] from [user name] on [object name];
Assign permissions to custom application user roles based on job functions:
From SQL*Plus:
grant [privilege name] to [user role] on [object name];
Run the SQL query:
select owner ||'.'|| table_name ||':'|| privilege from dba_tab_privs
where grantee = 'PUBLIC'
and owner not in
(<list of non-applicable accounts>);
(With respect to the list of special accounts that are excluded from this requirement, it is expected that the DBA will maintain the list to suit local circumstances, adding special accounts as necessary and removing any that are not supposed to be in use in the Oracle deployment that is under review.)
If any records that are not Oracle product accounts are returned, are not documented and authorized, this is a Finding.
NOTE: This check may return false positives where other Oracle product accounts are not included in the exclusion list.
V-219709
False
O112-BP-022600
Run the SQL query:
select owner ||'.'|| table_name ||':'|| privilege from dba_tab_privs
where grantee = 'PUBLIC'
and owner not in
(<list of non-applicable accounts>);
(With respect to the list of special accounts that are excluded from this requirement, it is expected that the DBA will maintain the list to suit local circumstances, adding special accounts as necessary and removing any that are not supposed to be in use in the Oracle deployment that is under review.)
If any records that are not Oracle product accounts are returned, are not documented and authorized, this is a Finding.
NOTE: This check may return false positives where other Oracle product accounts are not included in the exclusion list.
M
4057