1.14 All associated application files - 'Verify permissions'

Information

Allowing improper access to binaries that directly interface with the Oracle database adds unnecessary risk and increases the attack surface

See Also

https://workbench.cisecurity.org/files/580