| 3.1.1 Enable audit buffer | |
| 3.1.3 Require explicit authorization for cataloging | |
| 3.1.4 Disable data links support | |
| 3.1.5 Secure default database location - DFTDBPATH set to INSTANCE_HOME | |
| 3.1.7 Set diagnostic logging to capture errors and warnings | |
| 3.1.9 Require instance name for discovery requests | |
| 3.1.10 Disable instance discoverability | |
| 3.1.11 Authenticate federated users at the instance level | ACCESS CONTROL |
| 3.1.12 Enable instance health monitoring | |
| 3.1.13 Retain fenced model processes | |
| 3.1.14 Set maximum connection limits - MAX_CONNECTIONS | ACCESS CONTROL |
| 3.1.14 Set maximum connection limits - MAX_COORDAGENTS | ACCESS CONTROL |
| 3.1.15 Set administrative notification level | AUDIT AND ACCOUNTABILITY |
| 3.1.16 Enable server-based authentication | IDENTIFICATION AND AUTHENTICATION |
| 3.2.1 Set failed archive retry delay | |
| 3.2.2 Set the database instance to auto-restart after abnormal termination | |
| 3.2.3 Disable database discovery | |
| 3.2.8 Establish retention set size for backups | |
| 3.2.9 Set archive log failover retry limit | |
| 4.1 Enforce label-based access controls implementation | |
| 5.1 Enable backup redundancy | |
| 5.3 Enable automatic database maintenance | |
| 6.1 Restrict Access to SYSCAT.AUDITPOLICIES | ACCESS CONTROL |
| 6.2 Restrict Access to SYSCAT.AUDITUSE | ACCESS CONTROL |
| 6.3 Restrict Access to SYSCAT.DBAUTH | ACCESS CONTROL |
| 6.4 Restrict Access to SYSCAT.COLAUTH | ACCESS CONTROL |
| 6.5 Restrict Access to SYSCAT.EVENTS | ACCESS CONTROL |
| 6.6 Restrict Access to SYSCAT.EVENTTABLES | ACCESS CONTROL |
| 6.7 Restrict Access to SYSCAT.ROUTINES | ACCESS CONTROL |
| 6.8 Restrict Access to SYSCAT.INDEXAUTH | ACCESS CONTROL |
| 6.9 Restrict Access to SYSCAT.PACKAGEAUTH | ACCESS CONTROL |
| 6.10 Restrict Access to SYSCAT.PACKAGES | ACCESS CONTROL |
| 6.11 Restrict Access to SYSCAT.PASSTHRUAUTH | ACCESS CONTROL |
| 6.12 Restrict Access to SYSCAT.SECURITYLABELACCESS | ACCESS CONTROL |
| 6.13 Restrict Access to SYSCAT.SECURITYLABELCOMPONENTELEMENTS | ACCESS CONTROL |
| 6.14 Restrict Access to SYSCAT.SECURITYLABELCOMPONENTS | ACCESS CONTROL |
| 6.15 Restrict Access to SYSCAT.SECURITYLABELS | ACCESS CONTROL |
| 6.16 Restrict Access to SYSCAT.SECURITYPOLICIES | ACCESS CONTROL |
| 6.17 Restrict Access to SYSCAT.SECURITYPOLICYCOMPONENTRULES | ACCESS CONTROL |
| 6.18 Restrict Access to SYSCAT.SECURITYPOLICYEXEMPTIONS | ACCESS CONTROL |
| 6.19 Restrict Access to SYSCAT.SURROGATEAUTHIDS | ACCESS CONTROL |
| 6.20 Restrict Access to SYSCAT.ROLEAUTH | ACCESS CONTROL |
| 6.21 Restrict Access to SYSCAT.ROLES | ACCESS CONTROL |
| 6.22 Restrict Access to SYSCAT.ROUTINEAUTH | ACCESS CONTROL |
| 6.23 Restrict Access to SYSCAT.SCHEMAAUTH | ACCESS CONTROL |
| 6.24 Restrict Access to SYSCAT.SCHEMATA | ACCESS CONTROL |
| 6.25 Restrict Access to SYSCAT.SEQUENCEAUTH | ACCESS CONTROL |
| 6.26 Restrict Access to SYSCAT.STATEMENTS | ACCESS CONTROL |
| 6.27 Restrict Access to SYSCAT.PROCEDURES | ACCESS CONTROL |
| 6.28 Restrict Access to SYSCAT.TABAUTH | ACCESS CONTROL |