2.2.7 Ensure 'SQLNET.ENCRYPTION_SERVER' Is Set To 'REQUIRED'

Information

The SQLNET.ENCRYPTION_SERVER parameter determines whether the server side of a database connection enforces network encryption. When set to REQUIRED this parameter mandates that all data transmitted between the client and the database is encrypted, preventing the server from connecting if encryption cannot be established. This setting ensures that sensitive data remains protected during transmission.

If you are using TLS, this is not a required check. Oracle database network encryption configured through TLS/SSL is also an acceptable mechanism and may be implemented in lieu of this setting.

Caution: Modifying this parameter changes how the database creates and tests password verifiers. Please refer to recommendation 4.4.

Network encryption is crucial for safeguarding data transmitted over networks. Without encryption, data, including sensitive information like credentials, financial data, and personal details, is vulnerable to interception and potential compromise. Setting SQLNET.ENCRYPTION_SERVER to REQUIRED ensures that all client connections to the database use encryption, aligning with best practices for data protection and regulatory compliance requirements.

Solution

To remediate this recommendation, set SQLNET.ENCRYPTION_SERVER to REQUIRED

Impact:

Clients or applications that do not support encryption will NOT be able to connect to the database, which may necessitate updates to older client configurations.

See Also

https://workbench.cisecurity.org/benchmarks/16474

Item Details

Category: ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|AC-17(2), 800-53|IA-5, 800-53|IA-5(1), 800-53|SC-8, 800-53|SC-8(1), CSCv7|14.4

Plugin: Unix

Control ID: 56d25e69e0ccc750217b2432b9b002d83dc0a18986abec4167922e200533c88c