Owners of privileged accounts must use non-privileged accounts for non-administrative activities.

From Oracle Database 11.2g Security Technical Implementation Guide

Part of SRG-APP-000063-DB-000018

Associated with: CCI-000040

SV-74285r1_rule Owners of privileged accounts must use non-privileged accounts for non-administrative activities.

Vulnerability discussion

Use of privileged accounts for non-administrative purposes puts data at risk of unintended or unauthorized loss, modification, or exposure. In particular, DBA accounts, if used for non-administration application development or application maintenance, can lead to excessive privileges where privileges are inherited by object owners. It may also lead to loss or compromise of application data where the elevated privileges bypass controls designed in and provided by applications.

Check content

Review procedures and practices. If there is not a policy requiring owners of privileged accounts to use non-privileged accounts for non-administrative activities, this is a finding. If there is evidence that owners of privileged accounts do not adhere to this policy, this is a finding.

Fix text

Require that DBAs and other privileged users use non-privileged accounts for non-administrative activities.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer