SV-24670r1_rule
V-15102
DBMS audit report tools
DG0083-ORACLE11
CAT II
10
Develop, document and implement database or host system procedures to report audit trail data in a form usable to detect unauthorized access to or usage of DBMS privileges, procedures or data.
You may also want to consider procuring a third-party auditing tool like Oracle Audit Vault with support for Oracle and other DBMS products within your environment.
NOTE: Audit data may contain sensitive information. The use of a single repository for audit data should be protected at the highest level based on the sensitivity of the databases being audited.
If the database being reviewed is not a production database, this check is Not a Finding.
Interview the auditor or IAO to determine if an automated tool or procedure is used to report audit trail data. If an automated tool or procedure is not used, this is a Finding.
V-15102
False
DG0083-ORACLE11
If the database being reviewed is not a production database, this check is Not a Finding.
Interview the auditor or IAO to determine if an automated tool or procedure is used to report audit trail data. If an automated tool or procedure is not used, this is a Finding.
I
Information Assurance Officer
1368