SV-24652r1_rule
V-15130
DBMS inactive accounts
DG0074-ORACLE11
CAT II
10
Develop, document and implement procedures to monitor database accounts for inactivity and account expiration.
Investigate and re-authorize or delete [if appropriate] any accounts that are expired or have been inactive for more than 30 days.
Where appropriate, protect authorized expired or inactive accounts by disabling them or applying some other similar protection.
NOTE: Password and account requirements have changed for DoD since this STIG requirement was published.
Review procedures and implementation for monitoring the DBMS for account expiration and account inactivity.
Verify implemented procedures are in place to address expired/locked accounts not required for system/application operation are authorized to remain and are documented.
Verify implemented procedures are in place to address accounts that are unlocked and have been inactive in excess of 30 days are authorized to remain unlocked.
Verify implemented procedures are in place to address unauthorized, inactive accounts after 30 days are expired and locked.
Verify implemented procedures are in place to address expired/locked accounts that are not authorized to remain are dropped/removed/deleted.
A finding for this check would be based on insufficient documentation and implemented procedures for monitoring DBMS accounts.
V-15130
False
DG0074-ORACLE11
Review procedures and implementation for monitoring the DBMS for account expiration and account inactivity.
Verify implemented procedures are in place to address expired/locked accounts not required for system/application operation are authorized to remain and are documented.
Verify implemented procedures are in place to address accounts that are unlocked and have been inactive in excess of 30 days are authorized to remain unlocked.
Verify implemented procedures are in place to address unauthorized, inactive accounts after 30 days are expired and locked.
Verify implemented procedures are in place to address expired/locked accounts that are not authorized to remain are dropped/removed/deleted.
A finding for this check would be based on insufficient documentation and implemented procedures for monitoring DBMS accounts.
I
Database Administrator
1367