SV-24663r1_rule
V-15613
DBMS individual accounts
DG0078-ORACLE11
CAT II
10
Create individual accounts for each user, application, or other process that requires a database connection.
Document any accounts that are shared where separation is not supported by the application or for maintenance support.
Design, develop and implement a method to log use of any account to which more than one person has access.
Restrict interactive access to shared accounts to the fewest persons possible.
Review DBMS account names against the list of authorized DBMS accounts in the System Security Plan.
If any accounts indicate use by mulitiple persons that are not mapped to a specific person, this is a Finding.
If any applications or processes share an account that could be assigned an individual account or are not specified as requiring a shared account, this is a Finding.
Note: Privileged installation accounts may be required to be accessed by DBA or other administrators for system maintenance. In these cases, each use of the account must be logged in some manner to assign accountability for any actions taken during the use of the account.
V-15613
False
DG0078-ORACLE11
Review DBMS account names against the list of authorized DBMS accounts in the System Security Plan.
If any accounts indicate use by mulitiple persons that are not mapped to a specific person, this is a Finding.
If any applications or processes share an account that could be assigned an individual account or are not specified as requiring a shared account, this is a Finding.
Note: Privileged installation accounts may be required to be accessed by DBA or other administrators for system maintenance. In these cases, each use of the account must be logged in some manner to assign accountability for any actions taken during the use of the account.
M
Database Administrator
1367