STIGQter STIGQter: STIG Summary: Oracle Database 11.2g Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Apr 2021:

The DBMS must support the organizational requirements to specifically prohibit or restrict the use of unauthorized functions, ports, protocols, and/or services.

DISA Rule

SV-219773r395856_rule

Vulnerability Number

V-219773

Group Title

SRG-APP-000142-DB-000094

Rule Version

O112-C2-011900

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Disable functions, ports, protocols, and services that are not approved.

- - - - -

Change the SQLNET.ora, LISTENER.ora, and TNSNAMES.ora files to reflect the proper use of ports, protocols and services that are approved at the site.

If changes to the Listener are made, the files associated with the Listener must be reloaded. Do that by issuing the following commands at the Unix/Linux or Windows prompt.
First - issue the command to see what the current status is
$ lsnrctl stat
Then load the new file that was corrected to reflect site-specific requirements.
$ lsnrctl reload
Then check the status again to see that the changes have taken place
$ lsnrctl stat

Check Contents

Review the DBMS settings for functions, ports, protocols, and services that are not approved. If any are found, this is a finding.

(For definitive information on Ports, Protocols and Services Management (PPSM), refer to http://iase.disa.mil/ppsm/index.html.)

- - - - -

In the Oracle database, the communications with the database and incoming requests are performed by the Oracle Listener. The Oracle Listener listens on a specific port or ports for connections to a specific database. The Oracle Listener has configuration files located in the $ORACLE_HOME/network/admin directory. To check the ports and protocols in use, go to that directory and review the SQLNET.ora, LISTENER.ora, and the TNSNAMES.ora. If protocols or ports are in use that are not authorized, this is a finding.

Vulnerability Number

V-219773

Documentable

False

Rule Version

O112-C2-011900

Severity Override Guidance

Review the DBMS settings for functions, ports, protocols, and services that are not approved. If any are found, this is a finding.

(For definitive information on Ports, Protocols and Services Management (PPSM), refer to http://iase.disa.mil/ppsm/index.html.)

- - - - -

In the Oracle database, the communications with the database and incoming requests are performed by the Oracle Listener. The Oracle Listener listens on a specific port or ports for connections to a specific database. The Oracle Listener has configuration files located in the $ORACLE_HOME/network/admin directory. To check the ports and protocols in use, go to that directory and review the SQLNET.ora, LISTENER.ora, and the TNSNAMES.ora. If protocols or ports are in use that are not authorized, this is a finding.

Check Content Reference

M

Target Key

4057

Comments