You are on page 1of 4

Issue Type Issue Crtitcal Level Planned Deadline

Patching 6 Security Patches High 28th-10-2018


Setup SEC_CASE_SENSITIVE Logon to TRUE High 28th-10-2018

Well-known passwords should be changed for locked


accounts.
Change the password for unlocked user like.ABM,
AD_MONITOR, AHL, AHM
Periodically scan for default passwords (see patch
Setup 4926128 High 28th-10-2018

The AUDIT_SYSLOG_LEVEL parameter can be set to


send an abbreviated version of some audit records to
a remote syslog collector.
A better solution is to use Oracle Audit Vault and
Setup Database Firewall to centrally coll High 28th-10-2018

Evaluate custom directories


Modify audit_file_dest to point to a file system
Setup directory outside of ORACLE_HOME High 28th-10-2018

Every user account should include a verifier for


the latest password version supported by the
database so that the user can be authenticated
using the latest algorithm supported by the client.
When all clients have been updated, the security of
user accounts can be improved by removing the
obsolete verifiers
HTTP password verifiers are used for XML Database
authentication. Use the ALTER USER command to
remove these verifiers from user accounts that do not
Setup require this access Medium 28th-10-2018
Every user profile should include a password
Setup verification function.. Medium 28th-10-2018

Actions that affect the management of database


features should always be audited.
Each action or privilege listed here should be included
Setup in at least one enabled audit policy Medium 28th-10-2018

Usage of powerful system privileges (i.e. ALTER ANY


SQL TRANSLATION PROFILE, BECOME USER,CREATE
ANY SQL TRANSLATION PROFILE ) should always be
Setup audited Medium 15th-11-2018

SEC_RETURN_SERVER_RELEASE_BANNER should be
set to FALSE to limit the information that is returned
to an unauthenticated client, which could be used to
help determine the server's vulnerability to a remote
attack.
Setup Medium 15th-11-2018
For maximum security, use directory objects which
allow finer grained control of access, rather than
relying on this parameter.
Setup It is suggesting to set to '*' Medium 15th-11-2018

Enable Native Encryption or TLS.


For Native Encryption, both ENCRYPTION_SERVER and
CRYPTO_CHECKSUM_SERVER should be set to
REQUIRED.
If TLS is used, TCPS should be specified for all network
ports and SSL_CERT_REVOCATION should be set to
REQUIRED.
Setup Medium 15th-11-2018

Where appropriate, white-list servers/workstations


approved for access to the database in Oracle
Network files (sqlnet.ora) using TCP.INVITED_NODES
parameter

Implement ACL’s on a network firewall to control


access to the database
Setup Medium 15th-11-2018

These parameters are used to limit changes to the


network listener configuration.
ADMIN_RESTRICTIONS should be enabled to prevent
parameter changes to the running listener. One of the
following restrictions on service registration should be
implemented: (a) prevent changes by disabling
DYNAMIC_REGISTRATION, (b) limit the nodes that can
make changes by enabling
VALID_NODE_CHECKING_REGISTRATION, or (c) limit
the network sources for changes using the COST
parameters SECURE_PROTOCOL, SECURE_CONTROL,
and SECURE_REGISTER.
Setup Medium Nov-18
Expected Deadline Status
15th- Nov-2018 Pending with Oracle
15th-Nov-2018 Done in TEST , pending for PROD

15th-Nov-2018 Pending for PROD

15th-Nov-2018 Pending for PROD implementation

25th-Nov-2018 Pending for PROD

15th-Nov-2018 Pending for PROD

November Pending for PROD

November Open

November Open

November Closed
November Closed

November Paritally Closed

November OPEN (WIP)

November OPEN

You might also like