SlideShare a Scribd company logo
Oracle Database Security Checklist
An Oracle White Paper
June 2008
Oracle Database Security Checklist




Protecting the database environment ............................................................. 3
Install only what is required............................................................................. 3
Lock and expire default user accounts ........................................................... 4
Changing default user passwords.................................................................... 4
Change passwords for administrative accounts ............................................ 5
Change default passwords for all users .......................................................... 5
Enforce password management...................................................................... 5
Secure batch jobs............................................................................................... 5
Manage access to SYSDBA and SYSOPER roles........................................ 6
Enable Oracle data dictionary protection ...................................................... 6
Follow the principle of least privilege ............................................................ 6
Public privileges................................................................................................. 7
Restrict permissions on run-time facilities..................................................... 8
Authenticate clients ........................................................................................... 8
Restrict operating system access ..................................................................... 8
Secure the Oracle listener................................................................................. 8
Secure external procedures .............................................................................. 9
Prevent runtime changes to listener ............................................................... 9
Checking network IP addresses ...................................................................... 9
Harden the operating system......................................................................... 10
Encrypt network traffic .................................................................................. 10
Apply all security patches ............................................................................... 10
Report security issues to Oracle .................................................................... 10
Appendix A - Oracle Database 11g Release 1 Enterprise Edition default
accounts and their status ................................................................................ 11
Appendix B - Oracle Database 10g Release 1 and Release 2 Enterprise
Edition default accounts and their status..................................................... 12
Appendix C - Oracle Database 9i Release 2 Enterprise Edition default
accounts and their status ................................................................................ 14




                                                               Oracle Database Security Checklist      Page 2
Oracle Database Security Checklist




PROTECTING THE DATABASE ENVIRONMENT
Since Oracle9i, Oracle has been working with customers to better understand their
desired default configurations and harden the Oracle environment. For several
major releases of the database, the Oracle documentation has provided guidance on
securely configuring the Oracle Database. New with Oracle Database 11g is the
Oracle Database 2 Day + Security Guide, an excellent introductory reference for
Oracle Database Security.
Significant changes have been made since Oracle9i to make it easier for customers
to securely configure the Oracle Database. Oracle9i provided post installation
locking and expiration of most default accounts. Oracle Database 10g provided
optional install of demonstration accounts, new secure configuration scanning
functionality with Enterprise Manager, and changes to the default database role
CONNECT. Oracle Database 11g introduced a standards based password hashing
algorithm (SHA-1), optional default audit settings and optional default user profile
settings, enabling password expiration to be automatically enforced.
This paper recaps the security checklist that can be found in newer versions of the
Oracle Database Security Guide. The recommendations contained in this
document are intended to be general in nature. This document provides guidance
on configuring the Oracle Database based on security best practices for operational
database deployments. Details on specific database-related tasks and actions can be
found throughout the Oracle documentation set.

INSTALL ONLY WHAT IS REQUIRED
The Oracle Database software installation has two modes - typical and custom.
For production systems, the custom installation mode can be used to install the
minimum set of features and options required. If in the future, you wish to install
additional features or options, simply re-run the Oracle installer.
During installation you have the option to install a set of sample schemas. For
production environments, Oracle recommends you do not install the sample
schemas. If you have the sample schemas in your production system, Oracle
recommends either locking or removing them.




                                              Oracle Database Security Checklist   Page 3
LOCK AND EXPIRE DEFAULT USER ACCOUNTS
The Oracle database installs with a number of default (preset) user accounts. Each
account has a default (preset) database password. After successful installation of
the database the database configuration assistant (DBCA) automatically locks and
expires most default database user accounts. In addition, the password for
accounts such as SYSTEM are changed to the value specified during database
installation.
If a database is created manually then no default database user accounts are locked
because the Database Configuration Assistant is not being used to create the
database. After performing a manual database creation you should lock and expire
the database user accounts listed in the appendixes of this document that
correspond to your version of Oracle. Some Oracle products and features require
default accounts to remain unlocked. Descriptions of default accounts can be
found in the Oracle Database 2 Day - Security Guide. The guide lists all Oracle
Database 11g default accounts created during installation along with a brief
description of the account. In addition, you can find a list of all default accounts
and their status at the end of this document
The following SQL can be used to lock and expire database accounts.
sqlplus> connect mydba
sqlplus> alter user jsmith account lock and expire

CHANGING DEFAULT USER PASSWORDS
Choosing secure passwords and implementing good password policies are by far
the most important defense for protecting against password based security threats.
Oracle recommends customers use passwords at least 10 values in length. In
addition, the complexity of the password is critical. Passwords that are based on
dictionary words are vulnerable to "Dictionary based attacks". A complex
password should contain:
   •   At least 10 values in length
   •   A mixture of letters and numbers
   •   Contain mixed case (Supported in Oracle Database 11g)
   •   Include symbols (Supported in Oracle Database 11g)
   •   Little or no relation to an actual word
Please note that Pre-Oracle Database 11g allows "_", "$" and "#" symbols.
Although there is no substitute for a strong, complex password, the following
techniques can be used to generate longer passwords from a shorter, easier to
remember password.
   •   Create passwords from the 1st letters of the words of an easy-to-remember
       sentence




                                                 Oracle Database Security Checklist   Page 4
•   Combine 2 weaker passwords like "welcome1" and "tiger" into
      "WeltigerCome1"
  •   Repeat a character at the beginning or end of the password
  •   Add or append a string of some sort
  •   Append part of the same password
  •   Double some or all of the letters: "Welcome13" becomes "wweelcome1313"
Note that Oracle database passwords may not begin with a symbol or number and
may not exceed 30 characters in length. Using a technique from the above list
increases the work that an attacker must do before they can crack a password.

CHANGE PASSWORDS FOR ADMINISTRATIVE ACCOUNTS
While you can use the same password for administrative accounts such as
SYSTEM, SYSMAN and DBSNMP, Oracle recommends using different
passwords for each. In any Oracle environment, be it production or test, assign
strong and distinct passwords to these administrative accounts.

CHANGE DEFAULT PASSWORDS FOR ALL USERS
The default account SCOTT no longer installs with the default password TIGER.
The account is now locked and expired upon install. All other accounts installed
with a default password that is the same as the user account. If any of these
accounts is unlocked, assign a new stronger password. Starting with Oracle
Database 11g security administrators can easily check for default passwords by
using the new database view DBA_USERS_WITH_DEF_PWD.

ENFORCE PASSWORD MANAGEMENT
Oracle recommends customers enforce failed login, password expiration, password
complexity and reuse policies using Oracle profiles and follow best practices
defined by Oracle Applications. Oracle Database 11g provides an optional
installation choice that will pre-configure a default profile to enforce password
expiration and reuse. Oracle recommends that basic password management rules
be applied to all user passwords and that all users be required to change their
passwords periodically.

SECURE BATCH JOBS
The Secure External Password Store feature introduced with Oracle Database 10g
Release 2 is designed to help secure batch jobs that authenticate to the database
using username / password credentials. The secure external password store uses an
Oracle Wallet to hold one or more user name/password combinations to run batch
processes and other tasks that run without user interaction. The secure external
password store simplifies large-scale deployments that rely on password credentials
for connecting to databases. The best way to envision the password store is as a
table with three columns: - TNSALIAS, USERNAME, and PASSWORD. The TNSALIAS




                                             Oracle Database Security Checklist   Page 5
is basically the primary key that maps to a single user name/password combination.
Once setup, a batch job can simply specify a TNSALIAS and connect to the
database. It is very important that the permissions on the Wallet containing the
username and password be set accordingly as anyone with access to the Wallet
could us it to authenticate to the database. Usage of the Wallet for the
authentication credentials removes the requirement to hard code username and
password combinations in shell scripts and other batch type jobs.

MANAGE ACCESS TO SYSDBA AND SYSOPER ROLES
Special attention should be given to managing access to the SYSDBA and
SYSOPER roles. As with any database role, careful consideration should be given
when granting these roles. Oracle recommends customers refrain from connecting
with the SYSDBA role except when absolutely required such as called for by an
existing Oracle feature or patching. Moving forward Oracle will be eliminating all
dependencies on direct connections using SYSDBA. Large and small organizations
should create separate administrative accounts.
Note that connections specifying the SYSDBA or SYSOPER roles require a
password when connecting remotely and when an Oracle password file has been
created. Oracle recommends monitoring the Oracle audit log for unsuccessful
SYSDBA and SYSOPER connections.

ENABLE ORACLE DATA DICTIONARY PROTECTION
Oracle recommends that customers implement data dictionary protection to
prevent users who have the "ANY" system privileges from using such privileges to
modify or harm the Oracle data dictionary.
To enable data dictionary protection, set the
O7_DICTIONARY_ACCESSIBILITY parameter to FALSE. This can be
accomplished by using Oracle Enterprise Manager Database Control.
Some applications and tools may require access to the data dictionary. In those
cases, the individual user can be granted the SELECT ANY DICTIONARY
system privilege individually. Note that the SELECT ANY DICTIONARY
privilege is not included in the GRANT ALL PRIVILEGES statement.
Note that in Oracle8i the O7_DICTIONARY_ACCESSIBILITY parameter was
set to TRUE. Since Oracle9i the default setting for this parameter has been
FALSE.

FOLLOW THE PRINCIPLE OF LEAST PRIVILEGE
Oracle recommends you avoid granting powerful privileges to new database users,
even privileged users. The Oracle DBA role should be granted with caution and
only to those privileged user who need full DBA privileges. Special attention
should be given when assigning privileges to application schemas. Access to the
SYSDBA role should be granted with extreme care and only to those who are in




                                             Oracle Database Security Checklist   Page 6
the most trusted position. Auditing should be used to monitor all activities of
users connecting with the SYSDBA role or other administrative roles such as the
DBA role, CREATE ANY TABLE privilege and so forth. For optimal auditing
performance set your audit destination to point to the operating system.

PUBLIC PRIVILEGES
The topic of PUBLIC privileges is part of Oracle's overall secure-by-default
initiative that started with Oracle Database 9i. New in the Oracle Database 11g
release are granular authorizations for numerous PL/SQL network utility packages
granted to PUBLIC. If you have upgraded from a previous release of Oracle
Database, and your applications depend on PL/SQL network utility packages such
as UTL_TCP, UTL_SMTP, UTL_MAIL, UTL_HTTP AND UTL_INADDR the
following error may occur when you try to run the application:
ORA-24247: network access denied by access control list (ACL)
Additional information on the enhancements can be found in the Oracle Database
PL/SQL Types and References manual and the Managing Fine-grained Access to
External Network Services in the Oracle Database Security Guide. The Oracle
Database 11g enhancements to the packages increases their security and removes
the need to consider revoking access to them from the PUBLIC user group.
Directories accessible to the UTL _FILE package should be created using the
CREATE DIRECTORY command. Early releases of the UTL_FILE package
relied on the initialization parameter UTL_FILE_DIR to specify the accessible
directories. Usage of the CREATE DIRECTORY command enables finer
granularity and stronger security. For example the following commands create two
directories and authorize DBA group and the user APPUSER to access to access
each.

SQL> CREATE DIRECTORY log_dir AS '/appl/gl/log';
SQL> GRANT READ ON DIRECTORY log_dir TO DBA;
SQL> GRANT WRITE ON DIRECTORY log_dir TO DBA;
SQL> CREATE DIRECTORY out_dir AS '/appl/gl/appuser'';
SQL> GRANT READ ON DIRECTORY user_dir TO appuser;
SQL> GRANT WRITE ON DIRECTORY user_dir TO appuser;


Depending on the application model, it may be possible to remove grants from the
PUBLIC user group by first making grants directly to the application schema or
end user (depending on the application model) and then revoking the privilege
from the PUBLIC user group. For example, assume an application uses the
database schema APPCT. During install EXECUTE on the APPCT. ADDACCT




                                            Oracle Database Security Checklist   Page 7
function is granted to the PUBLIC user group. If the EXECUTE privilege on
ADDACCT was granted to the PUBLIC user group to allow another application
APPHR to access the APPCT.ADDACCT function, then EXECUTE on the
function could be granted directly to the APPHR schema and then revoked from
the PUBLIC user group.

RESTRICT PERMISSIONS ON RUN-TIME FACILITIES
When granting permissions on run-time facilities such as the Oracle Java Virtual
Machine (OJVM), grant permissions to the explicit or actual document root file
path. This code can be changed to use the explicit file path.

dbms_java.grant_permission
('SCOTT','SYS:java.io.FilePermission','<<ALL FILES>>','read');
dbms_java.grant_permission
('SCOTT','SYS:java.io.FilePermission','<<actual directory
path>>','read');

AUTHENTICATE CLIENTS
Oracle recommends verifying that the database initialization parameter
REMOTE_OS_AUTHENT is set to FALSE. Setting the value to FALSE creates
a more secure configuration by enforcing server-based authentication of clients
connecting to an Oracle database. The default setting for this parameter is FALSE
and it should not be changed.

RESTRICT OPERATING SYSTEM ACCESS
Limit the number of users with operating system access on the Oracle Database
host. Oracle recommends restricting the ability to modify the default file and
directory permissions for the Oracle Database home (installation) directory or its
contents. Even privileged operating system users and the Oracle owner should not
modify these permissions, unless instructed otherwise by Oracle.
Restrict usage of symbolic links on the operating system. When providing a path or
file to the Oracle database, neither the file nor any part of the path should be
modifiable by an un-trusted user. The file and all components of the path should
be owned by the DBA or another trusted operating system account.

SECURE THE ORACLE LISTENER
The Oracle Listener should be properly configured for optimal security. Oracle
Database 10g Release 1 and higher uses local OS authentication as the default
authentication mode. This mode requires the Oracle Net administrator to be a
member of the local DBA group. Setting a password for the TNS listener in
Oracle Database 10g Release 1 and higher simplifies local administration.
However, setting a password requires good password management to prevent
unauthorized users from guessing the password and potentially gaining access to




                                             Oracle Database Security Checklist   Page 8
privileged listener operations. Customers may wish to consider not setting a
password for the TNS listener starting with Oracle Database 10g Release 1.
Passwords should be used for databases prior to Oracle Database 10g Release 1 or
for remote administration of listeners on Oracle Database 10g Release 1 and higher
databases.
You should also consider using a firewall. Proper use of a firewall will reduce
exposure to security related information including port openings and other
configuration information located behind the firewall. Oracle Net supports a
variety of firewalls.

SECURE EXTERNAL PROCEDURES
The default configuration for external procedures no longer requires a network
listener to work with Oracle Database and EXTPROC agent. The EXTPROC
agent is spawned directly by Oracle Database and eliminates the risks that extproc
might be spawned by Oracle Listener, unexpectedly. This default configuration is
recommended for maximum security.
You can change the default configuration for external procedures and have your
EXTPROC agent spawned by Oracle Listener. To do this, however, you must
perform additional network configuration steps.
Having your EXTPROC agent spawned by Oracle Listener is necessary if you use:
   •   Multi-threaded Agent
   •   Oracle Database in MTS mode on Windows
   •   AGENT clause of the LIBRARY specification or AGENT IN clause of the
       PROCECDURE specification such that you can redirect external procedures
       to a different EXTPROC agent.
Please refer to the Oracle Net Services Guide for instructions on properly
configuring Oracle Net Services for external procedures.

PREVENT RUNTIME CHANGES TO LISTENER
When the ADMIN_RESTRICTIONS_LISTENER is set to ON (Default) runtime
changes to the listener parameters is disabled. To make changes, the
LISTENER.ORA file must be modified and manually reloaded.

CHECKING NETWORK IP ADDRESSES
Use the Oracle Net valid note checking security feature to allow or deny access to
Oracle server processes from network clients with specified IP address. To use this
feature, set the following protocol.ora (Oracle Net configuration file) parameters:

tcp.validnote_checking = YES
tcp.excluded_nodes = {list of IP addresses}




                                              Oracle Database Security Checklist   Page 9
tcp.invited_nodes = {list of IP addresses}


The first parameter turns on the feature whereas the latter parameters respectively
deny or allow specific client IP address from making connections to the Oracle
listener.

HARDEN THE OPERATING SYSTEM
Both UNIX and Windows platforms provide a variety of operating system services,
most of which are not necessary for most deployments. Such services include FTP,
TFTP, TELNET and so forth. Be sure to close both the UDP and TCP ports for
each service that is being disabled. Disabling one type of port and not the other
does not make the operating system more secure.

ENCRYPT NETWORK TRAFFIC
Consider encrypting network traffic between clients, databases and application
servers. Oracle supports both SSL using X.509v3 certificates as well as native
network encryption without certificates.

APPLY ALL SECURITY PATCHES
Always apply relevant security patches for both the operating system and Oracle.
Periodically check the Oracle Technology Network (OTN) security site for details
on security alerts released by Oracle. Also check Oracle Worldwide Supports
services site, Metalink, for detailed on available and upcoming security related
patches and application specific secure configuration information.

REPORT SECURITY ISSUES TO ORACLE
If you believe that you have found a security vulnerability in the Oracle Database,
submit an service request to Oracle Worldwide Support Services using Metalink, or
email a complete description of the problem including product version and
platform, together with any scripts and examples to the following address:
secalert_us@oracle.com




                                             Oracle Database Security Checklist   Page 10
APPENDIX A - ORACLE DATABASE 11G RELEASE 1 ENTERPRISE
EDITION DEFAULT ACCOUNTS AND THEIR STATUS



Username                              Account Status
ANONYMOUS                             EXPIRED & LOCKED
APEX_PUBLIC_USER                      EXPIRED & LOCKED
BI                                    EXPIRED & LOCKED
CTXSYS                                EXPIRED & LOCKED
DBSNMP                                OPEN
DIP                                   EXPIRED & LOCKED
DMSYS                                 EXPIRED & LOCKED
EXFSYS                                EXPIRED & LOCKED
FLOWS_03000                           EXPIRED & LOCKED
FLOWS_FILES                           EXPIRED & LOCKED
HR                                    EXPIRED & LOCKED
IX                                    EXPIRED & LOCKED
LBACSYS                               EXPIRED & LOCKED
MDDATA                                EXPIRED & LOCKED
MDSYS                                 EXPIRED & LOCKED
MGMT_VIEW                             OPEN
OE                                    EXPIRED & LOCKED
OLAPSYS                               EXPIRED & LOCKED
ORACLE_OCM                            EXPIRED & LOCKED
ORDPLUGINS                            EXPIRED & LOCKED
ORDSYS                                EXPIRED & LOCKED
OUTLN                                 EXPIRED & LOCKED
OWBSYS                                EXPIRED & LOCKED
PM                                    EXPIRED & LOCKED
SCOTT                                 EXPIRED & LOCKED
SH                                    EXPIRED & LOCKED




                              Oracle Database Security Checklist   Page 11
Username                              Account Status
SI_INFORMTN_SCHEMA                    EXPIRED & LOCKED
SPATIAL_CSW_ADMIN_USR                 EXPIRED & LOCKED
SPATIAL_WFS_ADMIN_USR                 EXPIRED & LOCKED
SYS                                   OPEN
SYSMAN                                OPEN
SYSTEM                                OPEN
TSMSYS                                EXPIRED & LOCKED
WK_TEST                               EXPIRED & LOCKED
WKPROXY                               EXPIRED & LOCKED
WKSYS                                 EXPIRED & LOCKED
WMSYS                                 EXPIRED & LOCKED
XDB                                   EXPIRED & LOCKED
XS$NULL                               EXPIRED & LOCKED


APPENDIX B - ORACLE DATABASE 10G RELEASE 1 AND RELEASE 2
ENTERPRISE EDITION DEFAULT ACCOUNTS AND THEIR STATUS



Username                              Account Status
ANONYMOUS                             EXPIRED & LOCKED
CTXSYS                                EXPIRED & LOCKED
DBSNMP                                EXPIRED & LOCKED
DIP                                   EXPIRED & LOCKED
DMSYS                                 EXPIRED & LOCKED
EXFSYS                                EXPIRED & LOCKED
HR                                    EXPIRED & LOCKED
LBACSYS                               EXPIRED & LOCKED
MDDATA                                EXPIRED & LOCKED
MDSYS                                 EXPIRED & LOCKED
MGMT_VIEW                             EXPIRED & LOCKED




                              Oracle Database Security Checklist   Page 12
Username                      Account Status
ODM                           EXPIRED & LOCKED
ODM_MTR                       EXPIRED & LOCKED
OE                            EXPIRED & LOCKED
OLAPSYS                       EXPIRED & LOCKED
ORDPLUGINS                    EXPIRED & LOCKED
ORDSYS                        EXPIRED & LOCKED
OUTLN                         EXPIRED & LOCKED
PM                            EXPIRED & LOCKED
QS                            EXPIRED & LOCKED
QS_ADM                        EXPIRED & LOCKED
QS_CB                         EXPIRED & LOCKED
QS_CBADM                      EXPIRED & LOCKED
QS_CS                         EXPIRED & LOCKED
QS_ES                         EXPIRED & LOCKED
QS_OS                         EXPIRED & LOCKED
QS_WS                         EXPIRED & LOCKED
RMAN                          EXPIRED & LOCKED
SCOTT                         EXPIRED & LOCKED
SH                            EXPIRED & LOCKED
SI_INFORMTN_SCHEMA            EXPIRED & LOCKED
SYS                           OPEN
SYSMAN                        EXPIRED & LOCKED
SYSTEM                        OPEN
TSMSYS New in 10g Release EXPIRED & LOCKED
2
WK_TEST                       EXPIRED & LOCKED
WKPROXY                       EXPIRED & LOCKED
WKSYS                         EXPIRED & LOCKED
WMSYS                         EXPIRED & LOCKED




                      Oracle Database Security Checklist   Page 13
Username                              Account Status
XDB                                   EXPIRED & LOCKED


APPENDIX C - ORACLE DATABASE 9I RELEASE 2 ENTERPRISE
EDITION DEFAULT ACCOUNTS AND THEIR STATUS



Username                              Account Status
ADAMS                                 EXPIRED & LOCKED
CTXSYS                                EXPIRED & LOCKED
DBSNMP                                OPEN
HR                                    EXPIRED & LOCKED
LBACSYS                               EXPIRED & LOCKED
MDSYS                                 EXPIRED & LOCKED
ODM                                   EXPIRED & LOCKED
ODM_MTR                               EXPIRED & LOCKED
ORDPLUGINS                            EXPIRED & LOCKED
ORDSYS                                EXPIRED & LOCKED
OUTLN                                 EXPIRED & LOCKED
PM                                    EXPIRED & LOCKED
QS                                    EXPIRED & LOCKED
QS_ADM                                EXPIRED & LOCKED
QS_CB                                 EXPIRED & LOCKED
QS_CBADM                              EXPIRED & LOCKED
QS_CS                                 EXPIRED & LOCKED
QS_ES                                 EXPIRED & LOCKED
QS_OS                                 EXPIRED & LOCKED
QS_WS                                 EXPIRED & LOCKED
SCOTT                                 OPEN
SH                                    EXPIRED & LOCKED
SYS                                   OPEN




                              Oracle Database Security Checklist   Page 14
Username           Account Status
SYSTEM             OPEN
WKPROXY            EXPIRED & LOCKED
WKSYS              EXPIRED & LOCKED
WMSYS              EXPIRED & LOCKED
XDB                EXPIRED & LOCKED




           Oracle Database Security Checklist   Page 15
Oracle Database Security Checklist
June 2008


Oracle Corporation
World Headquarters
500 Oracle Parkway
Redwood Shores, CA 94065
U.S.A.


Worldwide Inquiries:
Phone: +1.650.506.7000
Fax: +1.650.506.7200
oracle.com


Copyright © 2007, Oracle. All rights reserved.
This document is provided for information purposes only and the
contents hereof are subject to change without notice.
This document is not warranted to be error-free, nor subject to any
other warranties or conditions, whether expressed orally or implied
in law, including implied warranties and conditions of merchantability
or fitness for a particular purpose. We specifically disclaim any
liability with respect to this document and no contractual obligations
are formed either directly or indirectly by this document. This document
may not be reproduced or transmitted in any form or by any means,
electronic or mechanical, for any purpose, without our prior written permission.
Oracle is a registered trademark of Oracle Corporation and/or its affiliates.
Other names may be trademarks of their respective owners.

More Related Content

What's hot

Security Multitenant
Security MultitenantSecurity Multitenant
Security MultitenantArush Jain
 
Workbench en
Workbench enWorkbench en
DAC
DACDAC
Actor Model Import Connector for Microsoft Active Directory
Actor Model Import Connector for Microsoft Active DirectoryActor Model Import Connector for Microsoft Active Directory
Actor Model Import Connector for Microsoft Active Directory
protect724rkeer
 
SQL Server 2012 Security Task
SQL Server 2012 Security TaskSQL Server 2012 Security Task
SQL Server 2012 Security TaskYaakub Idris
 
Oracle ebs r12_architecture
Oracle ebs r12_architectureOracle ebs r12_architecture
Oracle ebs r12_architecture
srinivas sunkara
 
Oracle All-in-One - how to send mail with attach using oracle pl/sql
Oracle All-in-One - how to send mail with attach using oracle pl/sqlOracle All-in-One - how to send mail with attach using oracle pl/sql
Oracle All-in-One - how to send mail with attach using oracle pl/sql
Massimo Cenci
 
Implementing ASP.NET Role Based Security
Implementing ASP.NET Role Based SecurityImplementing ASP.NET Role Based Security
Implementing ASP.NET Role Based Security
Dean Willson
 
Actor Model Import Connector for Microsoft Active Directory Release Notes
Actor Model Import Connector for Microsoft Active Directory Release NotesActor Model Import Connector for Microsoft Active Directory Release Notes
Actor Model Import Connector for Microsoft Active Directory Release Notes
protect724rkeer
 
DTecH IT Education- Best Oracle dba training institute in bangalore
DTecH IT Education- Best Oracle dba training institute in bangaloreDTecH IT Education- Best Oracle dba training institute in bangalore
DTecH IT Education- Best Oracle dba training institute in bangalore
DTecH It Education
 
Obia with odi
Obia with odiObia with odi
Oracle SOA enterprise repositories Technical Overview
Oracle SOA enterprise repositories Technical OverviewOracle SOA enterprise repositories Technical Overview
Oracle SOA enterprise repositories Technical OverviewBiswanath Swain
 
MySQL Enterprise Monitor
MySQL Enterprise MonitorMySQL Enterprise Monitor
MySQL Enterprise Monitor
Mark Swarbrick
 
Oracle Enterprise Repository 11g - Quick Start Guide
Oracle Enterprise Repository 11g - Quick Start GuideOracle Enterprise Repository 11g - Quick Start Guide
Oracle Enterprise Repository 11g - Quick Start Guide
Sreenivasa Setty
 
Don't be tardy configure password expiration with open sso and identity mana...
Don't be tardy  configure password expiration with open sso and identity mana...Don't be tardy  configure password expiration with open sso and identity mana...
Don't be tardy configure password expiration with open sso and identity mana...Jose R
 
GeoVision : Access Control Solutions : Knowledge : AS Manager using MSSQL Server
GeoVision : Access Control Solutions : Knowledge : AS Manager using MSSQL ServerGeoVision : Access Control Solutions : Knowledge : AS Manager using MSSQL Server
GeoVision : Access Control Solutions : Knowledge : AS Manager using MSSQL Server
TSOLUTIONS
 
OTech magazine article - Principle of Least Privilege
OTech magazine article - Principle of Least PrivilegeOTech magazine article - Principle of Least Privilege
OTech magazine article - Principle of Least Privilege
Biju Thomas
 
Oracle Enterprise Repository
Oracle Enterprise RepositoryOracle Enterprise Repository
Oracle Enterprise Repository
Prabhat gangwar
 
Parnassus data recovery manager for oracle database user guide v0.3
Parnassus data recovery manager for oracle database user guide v0.3Parnassus data recovery manager for oracle database user guide v0.3
Parnassus data recovery manager for oracle database user guide v0.3
maclean liu
 

What's hot (20)

Security Multitenant
Security MultitenantSecurity Multitenant
Security Multitenant
 
Workbench en
Workbench enWorkbench en
Workbench en
 
DAC
DACDAC
DAC
 
Actor Model Import Connector for Microsoft Active Directory
Actor Model Import Connector for Microsoft Active DirectoryActor Model Import Connector for Microsoft Active Directory
Actor Model Import Connector for Microsoft Active Directory
 
SQL Server 2012 Security Task
SQL Server 2012 Security TaskSQL Server 2012 Security Task
SQL Server 2012 Security Task
 
Oracle ebs r12_architecture
Oracle ebs r12_architectureOracle ebs r12_architecture
Oracle ebs r12_architecture
 
Oracle All-in-One - how to send mail with attach using oracle pl/sql
Oracle All-in-One - how to send mail with attach using oracle pl/sqlOracle All-in-One - how to send mail with attach using oracle pl/sql
Oracle All-in-One - how to send mail with attach using oracle pl/sql
 
Implementing ASP.NET Role Based Security
Implementing ASP.NET Role Based SecurityImplementing ASP.NET Role Based Security
Implementing ASP.NET Role Based Security
 
Oracle Database Vault
Oracle Database VaultOracle Database Vault
Oracle Database Vault
 
Actor Model Import Connector for Microsoft Active Directory Release Notes
Actor Model Import Connector for Microsoft Active Directory Release NotesActor Model Import Connector for Microsoft Active Directory Release Notes
Actor Model Import Connector for Microsoft Active Directory Release Notes
 
DTecH IT Education- Best Oracle dba training institute in bangalore
DTecH IT Education- Best Oracle dba training institute in bangaloreDTecH IT Education- Best Oracle dba training institute in bangalore
DTecH IT Education- Best Oracle dba training institute in bangalore
 
Obia with odi
Obia with odiObia with odi
Obia with odi
 
Oracle SOA enterprise repositories Technical Overview
Oracle SOA enterprise repositories Technical OverviewOracle SOA enterprise repositories Technical Overview
Oracle SOA enterprise repositories Technical Overview
 
MySQL Enterprise Monitor
MySQL Enterprise MonitorMySQL Enterprise Monitor
MySQL Enterprise Monitor
 
Oracle Enterprise Repository 11g - Quick Start Guide
Oracle Enterprise Repository 11g - Quick Start GuideOracle Enterprise Repository 11g - Quick Start Guide
Oracle Enterprise Repository 11g - Quick Start Guide
 
Don't be tardy configure password expiration with open sso and identity mana...
Don't be tardy  configure password expiration with open sso and identity mana...Don't be tardy  configure password expiration with open sso and identity mana...
Don't be tardy configure password expiration with open sso and identity mana...
 
GeoVision : Access Control Solutions : Knowledge : AS Manager using MSSQL Server
GeoVision : Access Control Solutions : Knowledge : AS Manager using MSSQL ServerGeoVision : Access Control Solutions : Knowledge : AS Manager using MSSQL Server
GeoVision : Access Control Solutions : Knowledge : AS Manager using MSSQL Server
 
OTech magazine article - Principle of Least Privilege
OTech magazine article - Principle of Least PrivilegeOTech magazine article - Principle of Least Privilege
OTech magazine article - Principle of Least Privilege
 
Oracle Enterprise Repository
Oracle Enterprise RepositoryOracle Enterprise Repository
Oracle Enterprise Repository
 
Parnassus data recovery manager for oracle database user guide v0.3
Parnassus data recovery manager for oracle database user guide v0.3Parnassus data recovery manager for oracle database user guide v0.3
Parnassus data recovery manager for oracle database user guide v0.3
 

Viewers also liked

IS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in indiaIS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in india
iFour Consultancy
 
Technical Marketing is the Price of Admission
Technical Marketing is the Price of AdmissionTechnical Marketing is the Price of Admission
Technical Marketing is the Price of Admission
Michael King
 
101 Free Online Marketing Resources For Entrepreneurs
101 Free Online Marketing Resources For Entrepreneurs101 Free Online Marketing Resources For Entrepreneurs
101 Free Online Marketing Resources For Entrepreneurs
Fit Small Business
 
Web site int audit checklist intent
Web site int audit checklist intentWeb site int audit checklist intent
Web site int audit checklist intentmartinbusiness
 
Iso 9001 2015 audit checklist
Iso 9001 2015 audit checklistIso 9001 2015 audit checklist
Iso 9001 2015 audit checklist
Hamid Ali
 
Website Audit Checklist
Website Audit ChecklistWebsite Audit Checklist
Website Audit Checklist
Tim Bourgeois
 
Predictive Analytics: Context and Use Cases
Predictive Analytics: Context and Use CasesPredictive Analytics: Context and Use Cases
Predictive Analytics: Context and Use Cases
Kimberley Mitchell
 
Program management audit checklist
Program management audit checklistProgram management audit checklist
Program management audit checklist
Bob Prieto
 
Summer Training Presentation On HMT Machine Tools Ltd
Summer Training Presentation On HMT Machine Tools LtdSummer Training Presentation On HMT Machine Tools Ltd
Summer Training Presentation On HMT Machine Tools Ltd
Puneet Parihar
 
How to Audit Your Incident Response Plan
How to Audit Your Incident Response PlanHow to Audit Your Incident Response Plan
How to Audit Your Incident Response Plan
Resilient Systems
 
13 information system audit of banks
13 information system audit of banks13 information system audit of banks
13 information system audit of banks
spandane
 
Ch12 - Organisation theory design and change gareth jones
Ch12 - Organisation theory design and change gareth jonesCh12 - Organisation theory design and change gareth jones
Ch12 - Organisation theory design and change gareth jonesAnkit Kesri
 
Computer networking
Computer networkingComputer networking
Computer networking
Chinmoy Jena
 
Landforms 60 - PowerPoint - Version 2
Landforms 60 - PowerPoint - Version 2Landforms 60 - PowerPoint - Version 2
Landforms 60 - PowerPoint - Version 2
Yaryalitsa
 
Information System audit
Information System auditInformation System audit
Information System auditPratapchandra
 
Iso Process Audit Training
Iso Process Audit TrainingIso Process Audit Training
Iso Process Audit Training
srmortensen
 
Integrated treasury management in banks
Integrated treasury management in banksIntegrated treasury management in banks
Integrated treasury management in banksSahas Patil
 
Audit Checklist for Information Systems
Audit Checklist for Information SystemsAudit Checklist for Information Systems
Audit Checklist for Information Systems
Ahmad Tariq Bhatti
 
Entrepreneurship And Business Management
Entrepreneurship And Business ManagementEntrepreneurship And Business Management
Entrepreneurship And Business Management
Prof Parameshwar P Iyer
 

Viewers also liked (20)

IS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in indiaIS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in india
 
Technical Marketing is the Price of Admission
Technical Marketing is the Price of AdmissionTechnical Marketing is the Price of Admission
Technical Marketing is the Price of Admission
 
101 Free Online Marketing Resources For Entrepreneurs
101 Free Online Marketing Resources For Entrepreneurs101 Free Online Marketing Resources For Entrepreneurs
101 Free Online Marketing Resources For Entrepreneurs
 
Web site int audit checklist intent
Web site int audit checklist intentWeb site int audit checklist intent
Web site int audit checklist intent
 
Iso 9001 2015 audit checklist
Iso 9001 2015 audit checklistIso 9001 2015 audit checklist
Iso 9001 2015 audit checklist
 
Website Audit Checklist
Website Audit ChecklistWebsite Audit Checklist
Website Audit Checklist
 
Predictive Analytics: Context and Use Cases
Predictive Analytics: Context and Use CasesPredictive Analytics: Context and Use Cases
Predictive Analytics: Context and Use Cases
 
Program management audit checklist
Program management audit checklistProgram management audit checklist
Program management audit checklist
 
Summer Training Presentation On HMT Machine Tools Ltd
Summer Training Presentation On HMT Machine Tools LtdSummer Training Presentation On HMT Machine Tools Ltd
Summer Training Presentation On HMT Machine Tools Ltd
 
How to Audit Your Incident Response Plan
How to Audit Your Incident Response PlanHow to Audit Your Incident Response Plan
How to Audit Your Incident Response Plan
 
13 information system audit of banks
13 information system audit of banks13 information system audit of banks
13 information system audit of banks
 
Capex audit checklist
Capex audit checklistCapex audit checklist
Capex audit checklist
 
Ch12 - Organisation theory design and change gareth jones
Ch12 - Organisation theory design and change gareth jonesCh12 - Organisation theory design and change gareth jones
Ch12 - Organisation theory design and change gareth jones
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Landforms 60 - PowerPoint - Version 2
Landforms 60 - PowerPoint - Version 2Landforms 60 - PowerPoint - Version 2
Landforms 60 - PowerPoint - Version 2
 
Information System audit
Information System auditInformation System audit
Information System audit
 
Iso Process Audit Training
Iso Process Audit TrainingIso Process Audit Training
Iso Process Audit Training
 
Integrated treasury management in banks
Integrated treasury management in banksIntegrated treasury management in banks
Integrated treasury management in banks
 
Audit Checklist for Information Systems
Audit Checklist for Information SystemsAudit Checklist for Information Systems
Audit Checklist for Information Systems
 
Entrepreneurship And Business Management
Entrepreneurship And Business ManagementEntrepreneurship And Business Management
Entrepreneurship And Business Management
 

Similar to security-checklist-database

Oracle Database 11g Product Family
Oracle Database 11g Product FamilyOracle Database 11g Product Family
Oracle Database 11g Product FamilyN/A
 
Oracle oracle database 11g product family
Oracle oracle database 11g product familyOracle oracle database 11g product family
Oracle oracle database 11g product family
Sid Xing
 
Remote DBA Experts 11g Features
Remote DBA Experts 11g FeaturesRemote DBA Experts 11g Features
Remote DBA Experts 11g Features
Remote DBA Experts
 
12.2 secure configureconsole_adop_changes_aioug_appsdba_nov17
12.2 secure configureconsole_adop_changes_aioug_appsdba_nov1712.2 secure configureconsole_adop_changes_aioug_appsdba_nov17
12.2 secure configureconsole_adop_changes_aioug_appsdba_nov17
pasalapudi
 
1 ISACA JOURNAL VOLUME 1, 2012FeatureThe ability to r.docx
1 ISACA JOURNAL  VOLUME 1, 2012FeatureThe ability to r.docx1 ISACA JOURNAL  VOLUME 1, 2012FeatureThe ability to r.docx
1 ISACA JOURNAL VOLUME 1, 2012FeatureThe ability to r.docx
honey725342
 
PHP Oracle
PHP OraclePHP Oracle
PHP Oracle
Nur Hidayat
 
Clone Oracle Databases In Minutes Without Risk Using Enterprise Manager 13c
Clone Oracle Databases In Minutes Without Risk Using Enterprise Manager 13cClone Oracle Databases In Minutes Without Risk Using Enterprise Manager 13c
Clone Oracle Databases In Minutes Without Risk Using Enterprise Manager 13c
Alfredo Krieg
 
Oracle Security Presentation
Oracle Security PresentationOracle Security Presentation
Oracle Security Presentation
Francisco Alvarez
 
how to protect your sensitive data using oracle database vault
how to protect your sensitive data using oracle database vaulthow to protect your sensitive data using oracle database vault
how to protect your sensitive data using oracle database vaultAnar Godjaev
 
Database security issues
Database security issuesDatabase security issues
Database security issues
n|u - The Open Security Community
 
Oracle database edition-12c
Oracle database edition-12cOracle database edition-12c
Oracle database edition-12cAsha BG
 
Databse & Technology 2 _ Francisco Munoz Alvarez _ Oracle Security Tips - Som...
Databse & Technology 2 _ Francisco Munoz Alvarez _ Oracle Security Tips - Som...Databse & Technology 2 _ Francisco Munoz Alvarez _ Oracle Security Tips - Som...
Databse & Technology 2 _ Francisco Munoz Alvarez _ Oracle Security Tips - Som...InSync2011
 
Oracle plsql code refactoring - from anonymous block to stored procedure
Oracle plsql code refactoring - from anonymous block to stored procedureOracle plsql code refactoring - from anonymous block to stored procedure
Oracle plsql code refactoring - from anonymous block to stored procedure
Carlos Oliveira
 
Improving oracle12c security
Improving oracle12c securityImproving oracle12c security
Improving oracle12c security
Laurent Leturgez
 
The oracle database architecture
The oracle database architectureThe oracle database architecture
The oracle database architecture
Akash Pramanik
 
Improve oracle 12c security
Improve oracle 12c securityImprove oracle 12c security
Improve oracle 12c security
Laurent Leturgez
 
The Ultimate Guide to Upgrade ocp java 6, 7 &amp; 8 to java se 11 developer ...
The Ultimate Guide to Upgrade ocp java 6, 7 &amp; 8 to java se 11 developer  ...The Ultimate Guide to Upgrade ocp java 6, 7 &amp; 8 to java se 11 developer  ...
The Ultimate Guide to Upgrade ocp java 6, 7 &amp; 8 to java se 11 developer ...
ParshantiniRoy
 
8.1.6 newsecurity features
8.1.6 newsecurity features8.1.6 newsecurity features
8.1.6 newsecurity features
Anil Pandey
 
Oracle sql quick reference
Oracle sql quick referenceOracle sql quick reference
Oracle sql quick reference
maddy9055
 
Power point oracle db 12c
Power point oracle db 12cPower point oracle db 12c
Power point oracle db 12c
Nnabuike Nathaniel
 

Similar to security-checklist-database (20)

Oracle Database 11g Product Family
Oracle Database 11g Product FamilyOracle Database 11g Product Family
Oracle Database 11g Product Family
 
Oracle oracle database 11g product family
Oracle oracle database 11g product familyOracle oracle database 11g product family
Oracle oracle database 11g product family
 
Remote DBA Experts 11g Features
Remote DBA Experts 11g FeaturesRemote DBA Experts 11g Features
Remote DBA Experts 11g Features
 
12.2 secure configureconsole_adop_changes_aioug_appsdba_nov17
12.2 secure configureconsole_adop_changes_aioug_appsdba_nov1712.2 secure configureconsole_adop_changes_aioug_appsdba_nov17
12.2 secure configureconsole_adop_changes_aioug_appsdba_nov17
 
1 ISACA JOURNAL VOLUME 1, 2012FeatureThe ability to r.docx
1 ISACA JOURNAL  VOLUME 1, 2012FeatureThe ability to r.docx1 ISACA JOURNAL  VOLUME 1, 2012FeatureThe ability to r.docx
1 ISACA JOURNAL VOLUME 1, 2012FeatureThe ability to r.docx
 
PHP Oracle
PHP OraclePHP Oracle
PHP Oracle
 
Clone Oracle Databases In Minutes Without Risk Using Enterprise Manager 13c
Clone Oracle Databases In Minutes Without Risk Using Enterprise Manager 13cClone Oracle Databases In Minutes Without Risk Using Enterprise Manager 13c
Clone Oracle Databases In Minutes Without Risk Using Enterprise Manager 13c
 
Oracle Security Presentation
Oracle Security PresentationOracle Security Presentation
Oracle Security Presentation
 
how to protect your sensitive data using oracle database vault
how to protect your sensitive data using oracle database vaulthow to protect your sensitive data using oracle database vault
how to protect your sensitive data using oracle database vault
 
Database security issues
Database security issuesDatabase security issues
Database security issues
 
Oracle database edition-12c
Oracle database edition-12cOracle database edition-12c
Oracle database edition-12c
 
Databse & Technology 2 _ Francisco Munoz Alvarez _ Oracle Security Tips - Som...
Databse & Technology 2 _ Francisco Munoz Alvarez _ Oracle Security Tips - Som...Databse & Technology 2 _ Francisco Munoz Alvarez _ Oracle Security Tips - Som...
Databse & Technology 2 _ Francisco Munoz Alvarez _ Oracle Security Tips - Som...
 
Oracle plsql code refactoring - from anonymous block to stored procedure
Oracle plsql code refactoring - from anonymous block to stored procedureOracle plsql code refactoring - from anonymous block to stored procedure
Oracle plsql code refactoring - from anonymous block to stored procedure
 
Improving oracle12c security
Improving oracle12c securityImproving oracle12c security
Improving oracle12c security
 
The oracle database architecture
The oracle database architectureThe oracle database architecture
The oracle database architecture
 
Improve oracle 12c security
Improve oracle 12c securityImprove oracle 12c security
Improve oracle 12c security
 
The Ultimate Guide to Upgrade ocp java 6, 7 &amp; 8 to java se 11 developer ...
The Ultimate Guide to Upgrade ocp java 6, 7 &amp; 8 to java se 11 developer  ...The Ultimate Guide to Upgrade ocp java 6, 7 &amp; 8 to java se 11 developer  ...
The Ultimate Guide to Upgrade ocp java 6, 7 &amp; 8 to java se 11 developer ...
 
8.1.6 newsecurity features
8.1.6 newsecurity features8.1.6 newsecurity features
8.1.6 newsecurity features
 
Oracle sql quick reference
Oracle sql quick referenceOracle sql quick reference
Oracle sql quick reference
 
Power point oracle db 12c
Power point oracle db 12cPower point oracle db 12c
Power point oracle db 12c
 

More from Mohsen B

Problem details
Problem detailsProblem details
Problem details
Mohsen B
 
Using sap-netweaver-with-dbim-2594359
Using sap-netweaver-with-dbim-2594359Using sap-netweaver-with-dbim-2594359
Using sap-netweaver-with-dbim-2594359
Mohsen B
 
Restore procedure
Restore procedureRestore procedure
Restore procedure
Mohsen B
 
Backup script
Backup scriptBackup script
Backup script
Mohsen B
 
Refresh standby using rman backup
Refresh standby using rman backupRefresh standby using rman backup
Refresh standby using rman backup
Mohsen B
 
Using a physical standby database for read write
Using a physical standby database for read writeUsing a physical standby database for read write
Using a physical standby database for read write
Mohsen B
 
Automate DG Best Practices
Automate DG  Best PracticesAutomate DG  Best Practices
Automate DG Best Practices
Mohsen B
 
Cygwin installation
Cygwin installationCygwin installation
Cygwin installationMohsen B
 
Huge pages
Huge pagesHuge pages
Huge pages
Mohsen B
 
Simple network troubleshooting
Simple network troubleshootingSimple network troubleshooting
Simple network troubleshooting
Mohsen B
 
Rhel asmlib to_udev
Rhel asmlib to_udevRhel asmlib to_udev
Rhel asmlib to_udevMohsen B
 
Finding root blocker in oracle database
Finding root blocker in oracle databaseFinding root blocker in oracle database
Finding root blocker in oracle databaseMohsen B
 
Asm 11g r1_bestpractices_7_301
Asm 11g r1_bestpractices_7_301Asm 11g r1_bestpractices_7_301
Asm 11g r1_bestpractices_7_301Mohsen B
 
Oracle & sql server comparison 2
Oracle & sql server comparison 2Oracle & sql server comparison 2
Oracle & sql server comparison 2Mohsen B
 

More from Mohsen B (16)

Problem details
Problem detailsProblem details
Problem details
 
Using sap-netweaver-with-dbim-2594359
Using sap-netweaver-with-dbim-2594359Using sap-netweaver-with-dbim-2594359
Using sap-netweaver-with-dbim-2594359
 
Restore procedure
Restore procedureRestore procedure
Restore procedure
 
Backup script
Backup scriptBackup script
Backup script
 
Refresh standby using rman backup
Refresh standby using rman backupRefresh standby using rman backup
Refresh standby using rman backup
 
Using a physical standby database for read write
Using a physical standby database for read writeUsing a physical standby database for read write
Using a physical standby database for read write
 
Automate DG Best Practices
Automate DG  Best PracticesAutomate DG  Best Practices
Automate DG Best Practices
 
Rac
RacRac
Rac
 
Cygwin installation
Cygwin installationCygwin installation
Cygwin installation
 
Cman
CmanCman
Cman
 
Huge pages
Huge pagesHuge pages
Huge pages
 
Simple network troubleshooting
Simple network troubleshootingSimple network troubleshooting
Simple network troubleshooting
 
Rhel asmlib to_udev
Rhel asmlib to_udevRhel asmlib to_udev
Rhel asmlib to_udev
 
Finding root blocker in oracle database
Finding root blocker in oracle databaseFinding root blocker in oracle database
Finding root blocker in oracle database
 
Asm 11g r1_bestpractices_7_301
Asm 11g r1_bestpractices_7_301Asm 11g r1_bestpractices_7_301
Asm 11g r1_bestpractices_7_301
 
Oracle & sql server comparison 2
Oracle & sql server comparison 2Oracle & sql server comparison 2
Oracle & sql server comparison 2
 

Recently uploaded

Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 

Recently uploaded (20)

Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 

security-checklist-database

  • 1. Oracle Database Security Checklist An Oracle White Paper June 2008
  • 2. Oracle Database Security Checklist Protecting the database environment ............................................................. 3 Install only what is required............................................................................. 3 Lock and expire default user accounts ........................................................... 4 Changing default user passwords.................................................................... 4 Change passwords for administrative accounts ............................................ 5 Change default passwords for all users .......................................................... 5 Enforce password management...................................................................... 5 Secure batch jobs............................................................................................... 5 Manage access to SYSDBA and SYSOPER roles........................................ 6 Enable Oracle data dictionary protection ...................................................... 6 Follow the principle of least privilege ............................................................ 6 Public privileges................................................................................................. 7 Restrict permissions on run-time facilities..................................................... 8 Authenticate clients ........................................................................................... 8 Restrict operating system access ..................................................................... 8 Secure the Oracle listener................................................................................. 8 Secure external procedures .............................................................................. 9 Prevent runtime changes to listener ............................................................... 9 Checking network IP addresses ...................................................................... 9 Harden the operating system......................................................................... 10 Encrypt network traffic .................................................................................. 10 Apply all security patches ............................................................................... 10 Report security issues to Oracle .................................................................... 10 Appendix A - Oracle Database 11g Release 1 Enterprise Edition default accounts and their status ................................................................................ 11 Appendix B - Oracle Database 10g Release 1 and Release 2 Enterprise Edition default accounts and their status..................................................... 12 Appendix C - Oracle Database 9i Release 2 Enterprise Edition default accounts and their status ................................................................................ 14 Oracle Database Security Checklist Page 2
  • 3. Oracle Database Security Checklist PROTECTING THE DATABASE ENVIRONMENT Since Oracle9i, Oracle has been working with customers to better understand their desired default configurations and harden the Oracle environment. For several major releases of the database, the Oracle documentation has provided guidance on securely configuring the Oracle Database. New with Oracle Database 11g is the Oracle Database 2 Day + Security Guide, an excellent introductory reference for Oracle Database Security. Significant changes have been made since Oracle9i to make it easier for customers to securely configure the Oracle Database. Oracle9i provided post installation locking and expiration of most default accounts. Oracle Database 10g provided optional install of demonstration accounts, new secure configuration scanning functionality with Enterprise Manager, and changes to the default database role CONNECT. Oracle Database 11g introduced a standards based password hashing algorithm (SHA-1), optional default audit settings and optional default user profile settings, enabling password expiration to be automatically enforced. This paper recaps the security checklist that can be found in newer versions of the Oracle Database Security Guide. The recommendations contained in this document are intended to be general in nature. This document provides guidance on configuring the Oracle Database based on security best practices for operational database deployments. Details on specific database-related tasks and actions can be found throughout the Oracle documentation set. INSTALL ONLY WHAT IS REQUIRED The Oracle Database software installation has two modes - typical and custom. For production systems, the custom installation mode can be used to install the minimum set of features and options required. If in the future, you wish to install additional features or options, simply re-run the Oracle installer. During installation you have the option to install a set of sample schemas. For production environments, Oracle recommends you do not install the sample schemas. If you have the sample schemas in your production system, Oracle recommends either locking or removing them. Oracle Database Security Checklist Page 3
  • 4. LOCK AND EXPIRE DEFAULT USER ACCOUNTS The Oracle database installs with a number of default (preset) user accounts. Each account has a default (preset) database password. After successful installation of the database the database configuration assistant (DBCA) automatically locks and expires most default database user accounts. In addition, the password for accounts such as SYSTEM are changed to the value specified during database installation. If a database is created manually then no default database user accounts are locked because the Database Configuration Assistant is not being used to create the database. After performing a manual database creation you should lock and expire the database user accounts listed in the appendixes of this document that correspond to your version of Oracle. Some Oracle products and features require default accounts to remain unlocked. Descriptions of default accounts can be found in the Oracle Database 2 Day - Security Guide. The guide lists all Oracle Database 11g default accounts created during installation along with a brief description of the account. In addition, you can find a list of all default accounts and their status at the end of this document The following SQL can be used to lock and expire database accounts. sqlplus> connect mydba sqlplus> alter user jsmith account lock and expire CHANGING DEFAULT USER PASSWORDS Choosing secure passwords and implementing good password policies are by far the most important defense for protecting against password based security threats. Oracle recommends customers use passwords at least 10 values in length. In addition, the complexity of the password is critical. Passwords that are based on dictionary words are vulnerable to "Dictionary based attacks". A complex password should contain: • At least 10 values in length • A mixture of letters and numbers • Contain mixed case (Supported in Oracle Database 11g) • Include symbols (Supported in Oracle Database 11g) • Little or no relation to an actual word Please note that Pre-Oracle Database 11g allows "_", "$" and "#" symbols. Although there is no substitute for a strong, complex password, the following techniques can be used to generate longer passwords from a shorter, easier to remember password. • Create passwords from the 1st letters of the words of an easy-to-remember sentence Oracle Database Security Checklist Page 4
  • 5. Combine 2 weaker passwords like "welcome1" and "tiger" into "WeltigerCome1" • Repeat a character at the beginning or end of the password • Add or append a string of some sort • Append part of the same password • Double some or all of the letters: "Welcome13" becomes "wweelcome1313" Note that Oracle database passwords may not begin with a symbol or number and may not exceed 30 characters in length. Using a technique from the above list increases the work that an attacker must do before they can crack a password. CHANGE PASSWORDS FOR ADMINISTRATIVE ACCOUNTS While you can use the same password for administrative accounts such as SYSTEM, SYSMAN and DBSNMP, Oracle recommends using different passwords for each. In any Oracle environment, be it production or test, assign strong and distinct passwords to these administrative accounts. CHANGE DEFAULT PASSWORDS FOR ALL USERS The default account SCOTT no longer installs with the default password TIGER. The account is now locked and expired upon install. All other accounts installed with a default password that is the same as the user account. If any of these accounts is unlocked, assign a new stronger password. Starting with Oracle Database 11g security administrators can easily check for default passwords by using the new database view DBA_USERS_WITH_DEF_PWD. ENFORCE PASSWORD MANAGEMENT Oracle recommends customers enforce failed login, password expiration, password complexity and reuse policies using Oracle profiles and follow best practices defined by Oracle Applications. Oracle Database 11g provides an optional installation choice that will pre-configure a default profile to enforce password expiration and reuse. Oracle recommends that basic password management rules be applied to all user passwords and that all users be required to change their passwords periodically. SECURE BATCH JOBS The Secure External Password Store feature introduced with Oracle Database 10g Release 2 is designed to help secure batch jobs that authenticate to the database using username / password credentials. The secure external password store uses an Oracle Wallet to hold one or more user name/password combinations to run batch processes and other tasks that run without user interaction. The secure external password store simplifies large-scale deployments that rely on password credentials for connecting to databases. The best way to envision the password store is as a table with three columns: - TNSALIAS, USERNAME, and PASSWORD. The TNSALIAS Oracle Database Security Checklist Page 5
  • 6. is basically the primary key that maps to a single user name/password combination. Once setup, a batch job can simply specify a TNSALIAS and connect to the database. It is very important that the permissions on the Wallet containing the username and password be set accordingly as anyone with access to the Wallet could us it to authenticate to the database. Usage of the Wallet for the authentication credentials removes the requirement to hard code username and password combinations in shell scripts and other batch type jobs. MANAGE ACCESS TO SYSDBA AND SYSOPER ROLES Special attention should be given to managing access to the SYSDBA and SYSOPER roles. As with any database role, careful consideration should be given when granting these roles. Oracle recommends customers refrain from connecting with the SYSDBA role except when absolutely required such as called for by an existing Oracle feature or patching. Moving forward Oracle will be eliminating all dependencies on direct connections using SYSDBA. Large and small organizations should create separate administrative accounts. Note that connections specifying the SYSDBA or SYSOPER roles require a password when connecting remotely and when an Oracle password file has been created. Oracle recommends monitoring the Oracle audit log for unsuccessful SYSDBA and SYSOPER connections. ENABLE ORACLE DATA DICTIONARY PROTECTION Oracle recommends that customers implement data dictionary protection to prevent users who have the "ANY" system privileges from using such privileges to modify or harm the Oracle data dictionary. To enable data dictionary protection, set the O7_DICTIONARY_ACCESSIBILITY parameter to FALSE. This can be accomplished by using Oracle Enterprise Manager Database Control. Some applications and tools may require access to the data dictionary. In those cases, the individual user can be granted the SELECT ANY DICTIONARY system privilege individually. Note that the SELECT ANY DICTIONARY privilege is not included in the GRANT ALL PRIVILEGES statement. Note that in Oracle8i the O7_DICTIONARY_ACCESSIBILITY parameter was set to TRUE. Since Oracle9i the default setting for this parameter has been FALSE. FOLLOW THE PRINCIPLE OF LEAST PRIVILEGE Oracle recommends you avoid granting powerful privileges to new database users, even privileged users. The Oracle DBA role should be granted with caution and only to those privileged user who need full DBA privileges. Special attention should be given when assigning privileges to application schemas. Access to the SYSDBA role should be granted with extreme care and only to those who are in Oracle Database Security Checklist Page 6
  • 7. the most trusted position. Auditing should be used to monitor all activities of users connecting with the SYSDBA role or other administrative roles such as the DBA role, CREATE ANY TABLE privilege and so forth. For optimal auditing performance set your audit destination to point to the operating system. PUBLIC PRIVILEGES The topic of PUBLIC privileges is part of Oracle's overall secure-by-default initiative that started with Oracle Database 9i. New in the Oracle Database 11g release are granular authorizations for numerous PL/SQL network utility packages granted to PUBLIC. If you have upgraded from a previous release of Oracle Database, and your applications depend on PL/SQL network utility packages such as UTL_TCP, UTL_SMTP, UTL_MAIL, UTL_HTTP AND UTL_INADDR the following error may occur when you try to run the application: ORA-24247: network access denied by access control list (ACL) Additional information on the enhancements can be found in the Oracle Database PL/SQL Types and References manual and the Managing Fine-grained Access to External Network Services in the Oracle Database Security Guide. The Oracle Database 11g enhancements to the packages increases their security and removes the need to consider revoking access to them from the PUBLIC user group. Directories accessible to the UTL _FILE package should be created using the CREATE DIRECTORY command. Early releases of the UTL_FILE package relied on the initialization parameter UTL_FILE_DIR to specify the accessible directories. Usage of the CREATE DIRECTORY command enables finer granularity and stronger security. For example the following commands create two directories and authorize DBA group and the user APPUSER to access to access each. SQL> CREATE DIRECTORY log_dir AS '/appl/gl/log'; SQL> GRANT READ ON DIRECTORY log_dir TO DBA; SQL> GRANT WRITE ON DIRECTORY log_dir TO DBA; SQL> CREATE DIRECTORY out_dir AS '/appl/gl/appuser''; SQL> GRANT READ ON DIRECTORY user_dir TO appuser; SQL> GRANT WRITE ON DIRECTORY user_dir TO appuser; Depending on the application model, it may be possible to remove grants from the PUBLIC user group by first making grants directly to the application schema or end user (depending on the application model) and then revoking the privilege from the PUBLIC user group. For example, assume an application uses the database schema APPCT. During install EXECUTE on the APPCT. ADDACCT Oracle Database Security Checklist Page 7
  • 8. function is granted to the PUBLIC user group. If the EXECUTE privilege on ADDACCT was granted to the PUBLIC user group to allow another application APPHR to access the APPCT.ADDACCT function, then EXECUTE on the function could be granted directly to the APPHR schema and then revoked from the PUBLIC user group. RESTRICT PERMISSIONS ON RUN-TIME FACILITIES When granting permissions on run-time facilities such as the Oracle Java Virtual Machine (OJVM), grant permissions to the explicit or actual document root file path. This code can be changed to use the explicit file path. dbms_java.grant_permission ('SCOTT','SYS:java.io.FilePermission','<<ALL FILES>>','read'); dbms_java.grant_permission ('SCOTT','SYS:java.io.FilePermission','<<actual directory path>>','read'); AUTHENTICATE CLIENTS Oracle recommends verifying that the database initialization parameter REMOTE_OS_AUTHENT is set to FALSE. Setting the value to FALSE creates a more secure configuration by enforcing server-based authentication of clients connecting to an Oracle database. The default setting for this parameter is FALSE and it should not be changed. RESTRICT OPERATING SYSTEM ACCESS Limit the number of users with operating system access on the Oracle Database host. Oracle recommends restricting the ability to modify the default file and directory permissions for the Oracle Database home (installation) directory or its contents. Even privileged operating system users and the Oracle owner should not modify these permissions, unless instructed otherwise by Oracle. Restrict usage of symbolic links on the operating system. When providing a path or file to the Oracle database, neither the file nor any part of the path should be modifiable by an un-trusted user. The file and all components of the path should be owned by the DBA or another trusted operating system account. SECURE THE ORACLE LISTENER The Oracle Listener should be properly configured for optimal security. Oracle Database 10g Release 1 and higher uses local OS authentication as the default authentication mode. This mode requires the Oracle Net administrator to be a member of the local DBA group. Setting a password for the TNS listener in Oracle Database 10g Release 1 and higher simplifies local administration. However, setting a password requires good password management to prevent unauthorized users from guessing the password and potentially gaining access to Oracle Database Security Checklist Page 8
  • 9. privileged listener operations. Customers may wish to consider not setting a password for the TNS listener starting with Oracle Database 10g Release 1. Passwords should be used for databases prior to Oracle Database 10g Release 1 or for remote administration of listeners on Oracle Database 10g Release 1 and higher databases. You should also consider using a firewall. Proper use of a firewall will reduce exposure to security related information including port openings and other configuration information located behind the firewall. Oracle Net supports a variety of firewalls. SECURE EXTERNAL PROCEDURES The default configuration for external procedures no longer requires a network listener to work with Oracle Database and EXTPROC agent. The EXTPROC agent is spawned directly by Oracle Database and eliminates the risks that extproc might be spawned by Oracle Listener, unexpectedly. This default configuration is recommended for maximum security. You can change the default configuration for external procedures and have your EXTPROC agent spawned by Oracle Listener. To do this, however, you must perform additional network configuration steps. Having your EXTPROC agent spawned by Oracle Listener is necessary if you use: • Multi-threaded Agent • Oracle Database in MTS mode on Windows • AGENT clause of the LIBRARY specification or AGENT IN clause of the PROCECDURE specification such that you can redirect external procedures to a different EXTPROC agent. Please refer to the Oracle Net Services Guide for instructions on properly configuring Oracle Net Services for external procedures. PREVENT RUNTIME CHANGES TO LISTENER When the ADMIN_RESTRICTIONS_LISTENER is set to ON (Default) runtime changes to the listener parameters is disabled. To make changes, the LISTENER.ORA file must be modified and manually reloaded. CHECKING NETWORK IP ADDRESSES Use the Oracle Net valid note checking security feature to allow or deny access to Oracle server processes from network clients with specified IP address. To use this feature, set the following protocol.ora (Oracle Net configuration file) parameters: tcp.validnote_checking = YES tcp.excluded_nodes = {list of IP addresses} Oracle Database Security Checklist Page 9
  • 10. tcp.invited_nodes = {list of IP addresses} The first parameter turns on the feature whereas the latter parameters respectively deny or allow specific client IP address from making connections to the Oracle listener. HARDEN THE OPERATING SYSTEM Both UNIX and Windows platforms provide a variety of operating system services, most of which are not necessary for most deployments. Such services include FTP, TFTP, TELNET and so forth. Be sure to close both the UDP and TCP ports for each service that is being disabled. Disabling one type of port and not the other does not make the operating system more secure. ENCRYPT NETWORK TRAFFIC Consider encrypting network traffic between clients, databases and application servers. Oracle supports both SSL using X.509v3 certificates as well as native network encryption without certificates. APPLY ALL SECURITY PATCHES Always apply relevant security patches for both the operating system and Oracle. Periodically check the Oracle Technology Network (OTN) security site for details on security alerts released by Oracle. Also check Oracle Worldwide Supports services site, Metalink, for detailed on available and upcoming security related patches and application specific secure configuration information. REPORT SECURITY ISSUES TO ORACLE If you believe that you have found a security vulnerability in the Oracle Database, submit an service request to Oracle Worldwide Support Services using Metalink, or email a complete description of the problem including product version and platform, together with any scripts and examples to the following address: secalert_us@oracle.com Oracle Database Security Checklist Page 10
  • 11. APPENDIX A - ORACLE DATABASE 11G RELEASE 1 ENTERPRISE EDITION DEFAULT ACCOUNTS AND THEIR STATUS Username Account Status ANONYMOUS EXPIRED & LOCKED APEX_PUBLIC_USER EXPIRED & LOCKED BI EXPIRED & LOCKED CTXSYS EXPIRED & LOCKED DBSNMP OPEN DIP EXPIRED & LOCKED DMSYS EXPIRED & LOCKED EXFSYS EXPIRED & LOCKED FLOWS_03000 EXPIRED & LOCKED FLOWS_FILES EXPIRED & LOCKED HR EXPIRED & LOCKED IX EXPIRED & LOCKED LBACSYS EXPIRED & LOCKED MDDATA EXPIRED & LOCKED MDSYS EXPIRED & LOCKED MGMT_VIEW OPEN OE EXPIRED & LOCKED OLAPSYS EXPIRED & LOCKED ORACLE_OCM EXPIRED & LOCKED ORDPLUGINS EXPIRED & LOCKED ORDSYS EXPIRED & LOCKED OUTLN EXPIRED & LOCKED OWBSYS EXPIRED & LOCKED PM EXPIRED & LOCKED SCOTT EXPIRED & LOCKED SH EXPIRED & LOCKED Oracle Database Security Checklist Page 11
  • 12. Username Account Status SI_INFORMTN_SCHEMA EXPIRED & LOCKED SPATIAL_CSW_ADMIN_USR EXPIRED & LOCKED SPATIAL_WFS_ADMIN_USR EXPIRED & LOCKED SYS OPEN SYSMAN OPEN SYSTEM OPEN TSMSYS EXPIRED & LOCKED WK_TEST EXPIRED & LOCKED WKPROXY EXPIRED & LOCKED WKSYS EXPIRED & LOCKED WMSYS EXPIRED & LOCKED XDB EXPIRED & LOCKED XS$NULL EXPIRED & LOCKED APPENDIX B - ORACLE DATABASE 10G RELEASE 1 AND RELEASE 2 ENTERPRISE EDITION DEFAULT ACCOUNTS AND THEIR STATUS Username Account Status ANONYMOUS EXPIRED & LOCKED CTXSYS EXPIRED & LOCKED DBSNMP EXPIRED & LOCKED DIP EXPIRED & LOCKED DMSYS EXPIRED & LOCKED EXFSYS EXPIRED & LOCKED HR EXPIRED & LOCKED LBACSYS EXPIRED & LOCKED MDDATA EXPIRED & LOCKED MDSYS EXPIRED & LOCKED MGMT_VIEW EXPIRED & LOCKED Oracle Database Security Checklist Page 12
  • 13. Username Account Status ODM EXPIRED & LOCKED ODM_MTR EXPIRED & LOCKED OE EXPIRED & LOCKED OLAPSYS EXPIRED & LOCKED ORDPLUGINS EXPIRED & LOCKED ORDSYS EXPIRED & LOCKED OUTLN EXPIRED & LOCKED PM EXPIRED & LOCKED QS EXPIRED & LOCKED QS_ADM EXPIRED & LOCKED QS_CB EXPIRED & LOCKED QS_CBADM EXPIRED & LOCKED QS_CS EXPIRED & LOCKED QS_ES EXPIRED & LOCKED QS_OS EXPIRED & LOCKED QS_WS EXPIRED & LOCKED RMAN EXPIRED & LOCKED SCOTT EXPIRED & LOCKED SH EXPIRED & LOCKED SI_INFORMTN_SCHEMA EXPIRED & LOCKED SYS OPEN SYSMAN EXPIRED & LOCKED SYSTEM OPEN TSMSYS New in 10g Release EXPIRED & LOCKED 2 WK_TEST EXPIRED & LOCKED WKPROXY EXPIRED & LOCKED WKSYS EXPIRED & LOCKED WMSYS EXPIRED & LOCKED Oracle Database Security Checklist Page 13
  • 14. Username Account Status XDB EXPIRED & LOCKED APPENDIX C - ORACLE DATABASE 9I RELEASE 2 ENTERPRISE EDITION DEFAULT ACCOUNTS AND THEIR STATUS Username Account Status ADAMS EXPIRED & LOCKED CTXSYS EXPIRED & LOCKED DBSNMP OPEN HR EXPIRED & LOCKED LBACSYS EXPIRED & LOCKED MDSYS EXPIRED & LOCKED ODM EXPIRED & LOCKED ODM_MTR EXPIRED & LOCKED ORDPLUGINS EXPIRED & LOCKED ORDSYS EXPIRED & LOCKED OUTLN EXPIRED & LOCKED PM EXPIRED & LOCKED QS EXPIRED & LOCKED QS_ADM EXPIRED & LOCKED QS_CB EXPIRED & LOCKED QS_CBADM EXPIRED & LOCKED QS_CS EXPIRED & LOCKED QS_ES EXPIRED & LOCKED QS_OS EXPIRED & LOCKED QS_WS EXPIRED & LOCKED SCOTT OPEN SH EXPIRED & LOCKED SYS OPEN Oracle Database Security Checklist Page 14
  • 15. Username Account Status SYSTEM OPEN WKPROXY EXPIRED & LOCKED WKSYS EXPIRED & LOCKED WMSYS EXPIRED & LOCKED XDB EXPIRED & LOCKED Oracle Database Security Checklist Page 15
  • 16. Oracle Database Security Checklist June 2008 Oracle Corporation World Headquarters 500 Oracle Parkway Redwood Shores, CA 94065 U.S.A. Worldwide Inquiries: Phone: +1.650.506.7000 Fax: +1.650.506.7200 oracle.com Copyright © 2007, Oracle. All rights reserved. This document is provided for information purposes only and the contents hereof are subject to change without notice. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. We specifically disclaim any liability with respect to this document and no contractual obligations are formed either directly or indirectly by this document. This document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior written permission. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners.