SV-24821r1_rule
V-15104
Encryption of DBMS sensitive data in transit
DG0167-ORACLE11
CAT I
10
Configure encryption of sensitive data served by the DBMS in accordance with the specifications provided in the System Security Plan and AIS Functional Architecture documentation.
Document acceptance of risk by the Information Owner where sensitive or classified data is not encrypted.
Have the IAO document assurance that the unencrypted sensitive or classified information is otherwise inaccessible to those who do not have Need-to-Know access to the data.
If no data is identified as being sensitive or classified by the Information Owner, in the System Security Plan or in the AIS Functional Architecture documentation, this check is Not a Finding.
If no identified sensitive or classified data requires encryption by the Information Owner in the System Security Plan and/or AIS Functional Architecture documentation, this check is Not a Finding.
If encryption requirements are listed and specify configuration at the host system or network device level, then review evidence that the configuration meets the specification.
It may be necessary to review network device configuration evidence or host communications configuration evidence.
If the evidence review does not meet the requirement or specification as listed in the System Security Plan, this is a Finding.
V-15104
False
DG0167-ORACLE11
If no data is identified as being sensitive or classified by the Information Owner, in the System Security Plan or in the AIS Functional Architecture documentation, this check is Not a Finding.
If no identified sensitive or classified data requires encryption by the Information Owner in the System Security Plan and/or AIS Functional Architecture documentation, this check is Not a Finding.
If encryption requirements are listed and specify configuration at the host system or network device level, then review evidence that the configuration meets the specification.
It may be necessary to review network device configuration evidence or host communications configuration evidence.
If the evidence review does not meet the requirement or specification as listed in the System Security Plan, this is a Finding.
M
Database Administrator
1368