Top

Oracle Database Security Assessment

Highly Confidential

Assessment Date & Time

Date of Data Collection Date of Report Reporter Version
Tue Jul 12 2022 02:52:40 UTC+00:00 Tue Jul 12 2022 02:57:55 UTC+00:00 2.2.2 (June 2021) - 6003

Database Identity

Name Container (Type:ID) Platform Database Role Log Mode Created
DGHOL MYPDB (PDB:3) Linux x86 64-bit PRIMARY ARCHIVELOG Sun Jul 10 2022 23:47:18 UTC+00:00

Summary

Section Pass Evaluate Advisory Low
Risk
Medium
Risk
High
Risk
Total
Findings
Basic Information 1 0 0 0 0 0 1
User Accounts 9 1 1 2 0 0 13
Privileges and Roles 14 7 1 0 0 0 22
Authorization Control 0 0 2 0 0 0 2
Fine-Grained Access Control 0 0 5 0 0 0 5
Auditing 0 8 5 0 0 0 13
Encryption 0 3 0 0 0 0 3
Database Configuration 9 4 0 0 0 0 13
Network Configuration 2 1 2 0 0 0 5
Operating System 3 1 0 0 1 0 5
Total 38 25 16 2 1 0 82

Basic Information

Database Version

Oracle Database 19c EE Extreme Perf Release 19.0.0.0.0 - Production
Security options used: Advanced Security

Security Features Utilized

Feature Currently Used
USER AUTHENTICATION
Password Authentication Yes
Global Authentication No
External Authentication No
AUTHORIZATION CONTROL
Database Vault No
Privilege Analysis No
ENCRYPTION
Tablespace Encryption Yes
Column Encryption No
Network Encryption Yes
AUDITING
Unified Audit Yes
Fine Grained Audit No
Traditional Audit Yes
FINE-GRAINED ACCESS CONTROL
Virtual Private Database No
Real Application Security No
Label Security No
Data Redaction No
Transparent Sensitive Data Protection No

Patch Check

User Accounts

Note: Predefined Oracle accounts which are schema-only or locked are not included in this report. To include all user accounts, run the report with the -a option.

User Accounts

User Name Status Profile Tablespace Oracle Defined Auth Type
C##HOLUSER OPEN DEFAULT USERS No PASSWORD
DBSAT_USER OPEN DEFAULT USERS No PASSWORD
PDBADMIN OPEN DEFAULT USERS No PASSWORD
PDBUSER OPEN DEFAULT USERS No PASSWORD
SYSTEM OPEN DEFAULT SYSTEM Yes PASSWORD

User Schemas in SYSTEM or SYSAUX Tablespace

Sample Schemas

Inactive Users

Users with Expired Passwords

Case-Sensitive Passwords

Users with Default Passwords

Minimum Client Authentication Version

Password Verifiers

User Parameters

User Profiles

Profile Name Parameter Value
DEFAULT (Number of Users) 5
DEFAULT CONNECT_TIME UNLIMITED
DEFAULT FAILED_LOGIN_ATTEMPTS 3
DEFAULT IDLE_TIME UNLIMITED
DEFAULT INACTIVE_ACCOUNT_TIME UNLIMITED
DEFAULT PASSWORD_GRACE_TIME 7 day(s)
DEFAULT PASSWORD_LIFE_TIME 60 day(s)
DEFAULT PASSWORD_LOCK_TIME 1 day(s)
DEFAULT PASSWORD_REUSE_MAX 5
DEFAULT PASSWORD_REUSE_TIME 365 day(s)
DEFAULT PASSWORD_ROLLOVER_TIME -1
DEFAULT PASSWORD_VERIFY_FUNCTION ORA12C_STRONG_VERIFY_FUNCTION
ORA_STIG_PROFILE (Number of Users) 0
ORA_STIG_PROFILE CONNECT_TIME UNLIMITED (DEFAULT)
ORA_STIG_PROFILE FAILED_LOGIN_ATTEMPTS 3
ORA_STIG_PROFILE IDLE_TIME 15 minute(s)
ORA_STIG_PROFILE INACTIVE_ACCOUNT_TIME 35 day(s)
ORA_STIG_PROFILE PASSWORD_GRACE_TIME 5 day(s)
ORA_STIG_PROFILE PASSWORD_LIFE_TIME 60 day(s)
ORA_STIG_PROFILE PASSWORD_LOCK_TIME UNLIMITED
ORA_STIG_PROFILE PASSWORD_REUSE_MAX 10
ORA_STIG_PROFILE PASSWORD_REUSE_TIME 365 day(s)
ORA_STIG_PROFILE PASSWORD_ROLLOVER_TIME -1 (DEFAULT)
ORA_STIG_PROFILE PASSWORD_VERIFY_FUNCTION ORA12C_STIG_VERIFY_FUNCTION

Users with Unlimited Password Lifetime

Account Locking after Failed Login Attempts

Password Verification Functions

Users with Unlimited Concurrent Sessions

Privileges and Roles

System Privilege Grants

All Roles

Code Based Access Control

Account Management Privileges

Role and Privilege Management Privileges

Database Management Privileges

Audit Management Package

Audit Management Privileges

Broad Data Access Privileges

Access Control Exemption Privileges

Access to Password Verifier Tables

Write Access to Restricted Objects

Access to Audit Objects

User Impersonation Privilege

Data Exfiltration

System Privileges Granted to PUBLIC

Roles Granted to PUBLIC

Column Privileges Granted to PUBLIC

Users with Administrative SYS* Privileges

Users with DBA Role

Users with Powerful Roles

Java Permissions

Authorization Control

Database Vault

Privilege Analysis

Fine-Grained Access Control

Data Redaction

Virtual Private Database

Real Application Security

Label Security

Transparent Sensitive Data Protection (TSDP)

Auditing

Audit Records

Unified Audit Policies

Audit User Logon / Logoff

Audit Administrative (SYS*) Users

Audit Database Management Activities

Audit Account Management Activities

Audit System Privileges

Audit Roles with System Privileges

Audit Powerful Privileges

Audit Privilege Management

Audit SQL Statements

Audit Object Actions

Fine Grained Audit

Encryption

Transparent Data Encryption

Encryption Key Wallet

FIPS Mode for TDE and DBMS_CRYPTO

Database Configuration

Initialization Parameters for Security

Name Value
ADG_ACCOUNT_INFO_TRACKING LOCAL
AUDIT_FILE_DEST /u01/app/oracle/admin/DGHOL_phx18b/adump
AUDIT_SYSLOG_LEVEL
AUDIT_SYS_OPERATIONS TRUE
AUDIT_TRAIL DB
COMPATIBLE 19.0.0
CURSOR_BIND_CAPTURE_DESTINATION memory+disk
DBFIPS_140 FALSE
DISPATCHERS (PROTOCOL=TCP) (SERVICE=DGHOLXDB)
ENCRYPT_NEW_TABLESPACES ALWAYS
GLOBAL_NAMES TRUE
LDAP_DIRECTORY_ACCESS NONE
LDAP_DIRECTORY_SYSAUTH no
O7_DICTIONARY_ACCESSIBILITY
OS_AUTHENT_PREFIX ops$
OS_ROLES FALSE
OUTBOUND_DBLINK_PROTOCOLS ALL
PDB_LOCKDOWN
PDB_OS_CREDENTIAL
REMOTE_DEPENDENCIES_MODE TIMESTAMP
REMOTE_LISTENER
REMOTE_LOGIN_PASSWORDFILE EXCLUSIVE
REMOTE_OS_AUTHENT FALSE
REMOTE_OS_ROLES FALSE
RESOURCE_LIMIT TRUE
SEC_CASE_SENSITIVE_LOGON TRUE
SEC_MAX_FAILED_LOGIN_ATTEMPTS 3
SEC_PROTOCOL_ERROR_FURTHER_ACTION (DROP,3)
SEC_PROTOCOL_ERROR_TRACE_ACTION TRACE
SEC_RETURN_SERVER_RELEASE_BANNER FALSE
SQL92_SECURITY TRUE
UNIFIED_AUDIT_SGA_QUEUE_SIZE 1048576
UNIFIED_AUDIT_SYSTEMLOG
UTL_FILE_DIR
_TRACE_FILES_PUBLIC

Inference of Table Data

Access to Password File

Network Communication

External OS Authorization

Instance Name Check

Triggers

Disabled Constraints

External Procedures

Directory Objects

Database Links

Network Access Control

XML Database Access Control

Database Backup

Network Configuration

Network Encryption

Client Nodes

SQLNET Banners

Network Listener Configuration

Listener Logging Control

Operating System

OS Authentication

Process Monitor Processes

Agent Processes

Listener Processes

File Permissions in ORACLE_HOME


This report provides information and recommendations that may be helpful in securing your Oracle database system. These recommendations reflect best practices for database security and should be part of any strategy for Data Protection by Design and by Default. These practices may help in addressing Articles 25 and 32 of the EU General Data Protection Regulation as well as other data privacy regulations. Technical controls alone are not sufficient for compliance. Passing all findings does not guarantee compliance.

Oracle Database Vault, Oracle Advanced Security, Oracle Label Security, Oracle Data Masking and Subsetting Pack are database licensed options. Oracle Key Vault and Oracle Audit Vault and Database Firewall require separate licensing as well.

The report provides a view on the current status. The results shown are provided for informational purposes only and should not be used as a substitute for a thorough analysis or interpreted to contain any legal or regulatory advice or guidance.

You are solely responsible for your system, and the data and information gathered during the production of this report. You are also solely responsible for the execution of software to produce this report, and for the effect and results of the execution of any mitigating actions identified herein.

Oracle provides this analysis on an "as is" basis without warranty of any kind and Oracle hereby disclaims all warranties and conditions whether express, implied or statutory.