O19C-00-000200 - Oracle Database must protect against or limit the effects of organization-defined types of denial-of-service (DoS) attacks.

Information

DOS attacks, more correctly characterized as "Denial-of-Service Events" as they most often the result of run-away processes and accidents, are the result of an excessive demand for a limiting resource.

A variety of technologies exist to limit, or in some cases, eliminate the effects of DoS attacks. For example, boundary protection devices can filter certain types of packets to protect devices on an organization's internal network from being directly affected by DoS attacks but within the database itself, Oracle provides the following mechanisms:

1. Reduction of excessive concurrent connections from a single user (see STIG_ID O19C-00-000100).
2. Limiting the database connection rate (LISTENER.ORA).
3. Limiting the amount of CPU available to users with Profile kernel limits.
4. Limiting the amount of I/O available to users with Profile kernel limits.
5. Limiting the amount of storage space with tablespace quotas.
6. Limiting idle time with profile kernel limits.

Other best practices such as limiting the number of parallel handles available to users with Resource Manager Plans or using CMAN are also recommended as part of an overall plan for DoS prevention.

Solution

Implement measures to limit the effects of organization-defined types of DoS attacks.

For each of the three queries in the Check, if there are findings, make the changes required to bring the environment into compliance.

For Listing 1:
Modify the $ORACLE_HOME/network/admin/listener.ora to establish a Rate Limit.
Restart the listener for changes to take effect.

For Listing 2:
Set limits on all profiles for CPU_PER_CALL, IDLE_TIME, and LOGICAL_READS_PER_CALL.

For Listing 3:
Enforce reasonable limits for tablespace consumption sufficient to prevent a DOS attack from impacting multiple applications or multiple services.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Database_19c_V1R5_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-10, CAT|II, CCI|CCI-000054, Rule-ID|SV-270496r1167727_rule, STIG-ID|O19C-00-000200, Vuln-ID|V-270496

Plugin: Unix

Control ID: 92c3d785775ca404c275a86470af6defa7aa6279d7c216f3838a7eccdcb69129