WBLC-08-000235 - Oracle WebLogic must protect the integrity of applications during the processes of data aggregation, packaging, and transformation in preparation for deployment.

Information

Information can be subjected to unauthorized changes (e.g., malicious and/or unintentional modification) at information aggregation or protocol transformation points. It is therefore imperative the application take steps to validate and assure the integrity of data while at these stages of processing.

The application server must ensure the integrity of data that is pending transfer for deployment is maintained. If the application were to simply transmit aggregated, packaged, or transformed data without ensuring the data was not manipulated during these processes, then the integrity of the data and the application itself may be called into question.

Solution

1. Access AC
2. From 'Domain Structure', select the top-level domain
3. Select 'Configuration' tab -> 'General' tab
4. Check 'Production Mode' checkbox. Click 'Save'
5. Restart all servers

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_WebLogic_Server_12c_V2R1_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-8(2), CAT|III, CCI|CCI-002420, Rule-ID|SV-235988r628742_rule, STIG-ID|WBLC-08-000235, STIG-Legacy|SV-70587, STIG-Legacy|V-56333, Vuln-ID|V-235988

Plugin: Unix

Control ID: a7ad15ef8e09b1ef92f9edf153e11c86273f9b459638cdb21b6ea671169853e6