SV-24817r1_rule
V-15654
DBMS symmetric key management
DG0165-ORACLE11
CAT II
10
Symmetric and other encryption keys require the following:
- protection from unauthorized access in transit and in storage
- utilization of accepted algorithms
- generation in accordance with required standards for the key's use
- expiration date
- continuity - key backup and recovery
- key change
- archival key storage (as necessary)
Details for key management requirements are provided by FIPS 140-2 key management standards available from NIST.
Oracle Advanced Security is required to provide symmetric key management features.
If Symmetric keys are present and Oracle Advanced Security is not installed and operational on the DBMS host, this is a Finding.
If the symmetric key management procedures and configuration settings for the DBMS are not specified in the System Security Plan, this is a Finding.
If the procedures are not followed with evidence for audit, this is a Finding.
NOTE: This check does not include a review of the key management procedures for validity. Specific key management requirements may be covered under separate checks.
V-15654
False
DG0165-ORACLE11
If Symmetric keys are present and Oracle Advanced Security is not installed and operational on the DBMS host, this is a Finding.
If the symmetric key management procedures and configuration settings for the DBMS are not specified in the System Security Plan, this is a Finding.
If the procedures are not followed with evidence for audit, this is a Finding.
NOTE: This check does not include a review of the key management procedures for validity. Specific key management requirements may be covered under separate checks.
I
Database Administrator
1367