DG0068-ORACLE11 - DBMS tools or applications that echo or require a password entry in clear text should be protected from password display.

Information

Database applications may allow for entry of the account name and password as a visible parameter of the application execution command. This practice should be prohibited and disabled, if possible, by the application. If it cannot be disabled, then users should be strictly instructed not to use this feature. Typically, the application will prompt for this information and accept it without echoing it on the users computer screen.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Review policy and instructions included or noted in the System Security Plan used to inform users and administrators not to enter database passwords at the command line.

Review documented and implemented procedures used to monitor the DBMS system for such activity.

If policy or instructions do not exist, proof of users and administrators being briefed does not exist or monitoring for compliance is not being performed to dissuade the practice of entering database passwords on the command line, this is a Finding.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Database_11g_Y21M10_STIG.zip

Item Details

References: CAT|II, Rule-ID|SV-24643r1_rule, STIG-ID|DG0068-ORACLE11, Vuln-ID|V-3813

Plugin: Windows

Control ID: 4240b69f7f97de39a1bcbece01f908a36871835a82913e9f047aab4756e3f61a