SV-24449r1_rule
V-15122
DBMS network perimeter protection
DG0186-ORACLE11
CAT II
10
Do not allow direct connections from users originating from the Internet or other public network to the DBMS.
Include in the System Security Plan for the system whether the DBMS serves public-facing applications or applications serving users from other untrusted networks.
Do not store sensitive or classified data on a DBMS server that serves public-facing applications.
Review the System Security Plan to determine if the DBMS serves data to users or applications outside the local enclave.
If the DBMS is not accessed outside of the local enclave, this check is Not a Finding.
If the DBMS serves applications available from a public network (e.g. the Internet), then confirm that the application servers are located in a DMZ.
If the DBMS is located inside the local enclave and is directly accessible to public users, this is a Finding.
If the DBMS serves public-facing applications and is not protected from direct client connections and unauthorized networks, this is a Finding.
If the DBMS serves public-facing applications and contains sensitive or classified information, this is a Finding.
V-15122
False
DG0186-ORACLE11
Review the System Security Plan to determine if the DBMS serves data to users or applications outside the local enclave.
If the DBMS is not accessed outside of the local enclave, this check is Not a Finding.
If the DBMS serves applications available from a public network (e.g. the Internet), then confirm that the application servers are located in a DMZ.
If the DBMS is located inside the local enclave and is directly accessible to public users, this is a Finding.
If the DBMS serves public-facing applications and is not protected from direct client connections and unauthorized networks, this is a Finding.
If the DBMS serves public-facing applications and contains sensitive or classified information, this is a Finding.
I
Information Assurance Officer
1368