Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

CIS Oracle Benchmark Reports

by Stephanie Dunn
March 21, 2017

Databases are often targeted by attackers to gain access or exfiltrate confidential data within an organization. Many database administrators leverage Oracle’s database suite to support web applications, financial systems, and websites throughout the enterprise. When securing these systems, many organizations focus on applying patches or service packs, and assume the risk has been mitigated. However, some organizations fail to properly configure and harden database servers, which can leave critical systems and data vulnerable to attack. These report templates provide a high-level summary of results gathered from CIS compliance scans using the CIS Oracle Benchmarks.

Tenable Network Security has been certified by CIS to perform a wide variety of platform and application audits based on the best practice consensus benchmarks developed by CIS. Tenable submits example test cases for all of the criteria within each unique benchmark, and then submits our results to CIS personnel for official certification. Tenable has developed audit files based on the CIS Oracle Benchmarks, and has been approved and certified by CIS staff members.

When performing managed scans with SecurityCenter, some CIS audits require additional patch audits and vulnerability checks. Any additional requirements for completing an audit using the CIS Oracle Benchmarks will be included within the audit file description text. In some cases, multiple scans may be required to be performed, as Tenable provides both Level 1 and Level 2 audit checks. Level 1 checks provide minimum settings recommendations, and are generally considered safe to apply to most systems. Level 2 checks include recommendations for complex or highly secure environments, and can lead to reduced functionality of Oracle database servers.

In order to perform audit scans with SecurityCenter, CIS Oracle Benchmark audit files must be uploaded first. Next, the appropriate credentials must be added, after which a scan policy can be created. Finally, a scan can be scheduled. As part of the post scan jobs, the 'Auto-Run Reports' can be enabled automatically, running this report on the data collected using the appropriate audit file. Using these benchmarks will help to assess the effectiveness of existing security controls for Oracle 10g, 11g, 12c database servers, and Oracle Linux 6 and 7 systems. Information presented within these reports will provide the critical context needed to strengthen an organization's security posture.

The reports are available in the SecurityCenter Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. The reports can be easily located in the SecurityCenter Feed under the category Compliance & Configuration Assessment. The report requirements are:

  • SecurityCenter 5.2.0
  • Nessus 6.9.3
  • CIS Audit Files for Oracle databases and Oracle Linux are required, and the files required for each template are listed below with respective templates.

In order to maintain the overall security of systems and data within the enterprise, organizations must have an effective and repeatable way to measure compliance results. Tenable SecurityCenter helps organizations obtain results using the CIS Benchmarks by measuring compliance in real time, providing an accurate assessment of an organization’s security posture. By prioritizing remediation actions of misconfigured systems, the organization can maximize their investment in compliance reporting and system hardening efforts. With more supported technologies than any other vendor, organizations will obtain the most comprehensive view of the network, and the intelligence needed to assess systems running Oracle database servers using CIS compliance standards.

Report Templates

CIS Oracle Benchmark v2.01 – This benchmark provides guidance for establishing a secure configuration posture of Oracle 10g on Windows 2000 Server and Solaris 9 systems. This report includes a summary of results gathered from encryption settings, backup and recovery controls, file and directory permissions, and more. The audit files required to support this report template are:

  • CIS_Oracle_9_10_DB_Level1_v2.01.audit
  • CIS_Oracle_9_10_DB_Level2_v2.01.audit
  • CIS_Oracle_9_10_Unix_Level1_v2.01.audit
  • CIS_Oracle_9_10_Unix_Level2_v2.01.audit
  • CIS_Oracle_9_10_Windows_Level1_v2.01.audit
  • CIS_Oracle_9_10_Windows_Level2_v2.01.audit

CIS Oracle 11g Benchmark v1.1.0 - This benchmark addresses the recommended security settings and provides guidance for establishing a secure configuration posture of Oracle 11g on a Red Hat Enterprise Server 5. This report includes a summary of results gathered from database settings, account settings, audit and logging policies, and more. The audit files required to support this report template are:

  • CIS_v1.1.0_Oracle_11g_DB_Level_1.audit
  • CIS_v1.1.0_Oracle_11g_DB_Level_2.audit
  • CIS_v1.1.0_Oracle_11g_OS_Unix_Linux_Level_1.audit
  • CIS_v1.1.0_Oracle_11g_OS_Unix_Linux_Level_2.audit
  • CIS_v1.1.0_Oracle_11g_OS_Windows_Level_1.audit
  • CIS_v1.1.0_Oracle_11g_OS_Windows_Level_2.audit

CIS Oracle Database 11g R2_Benchmark v2.2.0 - This benchmark addresses the recommended security settings and provides guidance for establishing a secure configuration posture of Oracle Database 11g R2 (11.2.0.4) running on a Windows Server 2012 and Oracle Linux 6.5. This report includes a summary of results gathered from database settings, account restrictions, audit and logging policies, and more. The audit files required to support this report template are:

  • CIS_Oracle_Server_11g_R2_DB_v2.2.0.audit
  • CIS_Oracle_Server_11g_R2_Unix_v2.2.0.audit
  • CIS_Oracle_Server_11g_R2_Windows_v2.2.0.audit

CIS Oracle Database 12c Benchmark v2.0.0 - This benchmark addresses the recommended security settings and provides guidance for establishing a secure configuration posture of Oracle Database 12c (version 12.1.0.2) running on a Windows Server 2012 R2 and Oracle Linux 7 systems. This report includes a summary of results gathered from database settings, account restrictions, audit and logging policies, and more. The audit files required to support this report template are:

  • CIS_Oracle_Server_12c_DB_Traditional_L1_v2.0.0.audit
  • CIS_Oracle_Server_12c_DB_Unified_L1_v2.0.0.audit
  • CIS_Oracle_Server_12c_Linux_L1_v2.0.0.audit
  • CIS_Oracle_Server_12c_Windows_L1_v2.0.0.audit

CIS Oracle Linux 6 Benchmark v1.0.0 - This benchmark provides guidance for establishing a secure configuration posture for Oracle Linux 6 systems running on x86 and x64 platforms. This report includes a summary of results gathered from filesystem configuration settings, warning banners, service settings, logging and auditing controls, and more. The audit files required to support this report template are:

  • CIS_Oracle_Linux_6_Server_L1_v1.0.0.audit
  • CIS_Oracle_Linux_6_Server_L2_v1.0.0.audit
  • CIS_Oracle_Linux_6_Workstation_L1_v1.0.0.audit
  • CIS_Oracle_Linux_6_Workstation_L2_v1.0.0.audit

CIS Oracle Linux 7 Benchmark v2.0.0 - This benchmark provides guidance for establishing a secure configuration posture for Oracle Linux 7 systems running on x86 and x64 platforms. This report includes a summary of results gathered from filesystem settings, software updates, service settings, network configuration settings, and more. The audit files required to support this report template are:

  • CIS_Oracle_Linux_7_Server_L1_v2.0.0.audit
  • CIS_Oracle_Linux_7_Server_L2_v2.0.0.audit
  • CIS_Oracle_Linux_7_Workstation_L1_v2.0.0.audit
  • CIS_Oracle_Linux_7_Workstation_L2_v2.0.0.audit