6.2.13 Ensure 'SQL_FIREWALL_ADMIN' Is Revoked From Unauthorized 'GRANTEE'

Information

The SQL_FIREWALL_ADMIN role grants administrative privileges to the SQL Firewall, allowing grantees to configure security policies through firewall rules. Unauthorized users can bypass firewall rules, potentially allowing execution of malicious code, including SQL injection attacks.

An unauthorized user with this role can modify or disable firewall rules exposing the database to SQL injection or unauthorized access.

Solution

To remediate this setting, execute the following SQL statement, keeping in mind if this is granted in both container and pluggable database, you must connect to both places to revoke. Please ensure proper impact analysis is done before revoking the privilege from a role.

REVOKE SQL_FIREWALL_ADMIN FROM <grantee>;

In the case of a grant via a role:

REVOKE <rolename> FROM <grantee>;

See Also

https://workbench.cisecurity.org/benchmarks/16474

Item Details

Category: ACCESS CONTROL, MEDIA PROTECTION

References: 800-53|AC-3, 800-53|AC-5, 800-53|AC-6, 800-53|MP-2, CSCv7|14.6

Plugin: OracleDB

Control ID: ca33426d46efdbbc402ce11cdb4ac5445f46dbc3ac9ffa0b859cbdf61375ac15