O112-BP-025600 - Network access to the DBMS must be restricted to authorized personnel - TCP.INVITED_NODES

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Restricting remote access to specific, trusted systems helps prevent access by unauthorized and potentially malicious users.

Solution

Configure the database listener to restrict access by IP address or set up an external device to restrict network access to the DBMS.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Database_11-2g_V2R2_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7, CAT|II, CCI|CCI-000366, Rule-ID|SV-219738r401224_rule, STIG-ID|O112-BP-025600, STIG-Legacy|SV-68287, STIG-Legacy|V-54047, Vuln-ID|V-219738

Plugin: Unix

Control ID: 3a621e77cd0344996030d009574484c5bede6e3952dbb80a31b646dbeffa16e8