PDF Oracle White Paper Oracle Database Security Checklist
PDF Oracle White Paper Oracle Database Security Checklist
AReustthreicntipceartme cisliseionnts
..o..n....r.u...n. .-.t..i.m...e...f..a..c..i.l.i.t.i.e..s.................................................8
Restrict operating system access.................................................................8
Secure the Oracle listener............................................................................8
Secure external procedures..........................................................................9
Prevent runtime changes to listener............................................................9
Checking network IP addresses..................................................................9
Harden the operating system....................................................................10
Encrypt network traffic.............................................................................10
Apply all security patches...........................................................................10
Report security issues to Oracle................................................................10
Appendix A - Oracle Database 11g Release 1 Enterprise Edition default
accounts and their status............................................................................11
EAdpiptieondidxeBfau- lOt
arcacoleuDntastanbdasteh1e0irgsRtaetulesa..s.e...1...a..n...d...R...e..l.e..a..s.e...
2... E...n...t.e..r..p..r.i.s..e 12
Appendix C - Oracle Database 9i Release 2 Enterprise Edition default
accounts and their status............................................................................14
IbfeacaduasteabthaseeDisactarbe atsedCmoanfiugaulrlyatihonenAnsosisdteafnatu
Note that Oracle database passwords may not begin with a symbol or number and
may not exceed 30 characters in length. Using a technique from the above list
increases the work that an attacker must do before they can crack a password.
bp ea sas pwpol ired s tpoe railol duiscearllpy.asswords and that all users be required to
change their
PUBLIC PRIVILEGES
The topic of PUBLIC privileges is part of Oracle's overall secure-by-default
initiative that started with Oracle Database 9i. New in the Oracle Database 11g
release are granular authorizations for numerous PL/SQL network utility packages
granted to PUBLIC. If you have upgraded from a previous release of Oracle
Database, and your applications depend on PL/SQL network utility packages such
as UTL_TCP, UTL_SMTP, UTL_MAIL, UTL_HTTP AND UTL_INADDR the
following error may occur when you try to run the application:
ORA-24247: network access denied by access control list
(ACL)
Additional information on the enhancements can be found in the Oracle Database
PL/SQL Types and References manual and the Managing Fine-grained Access to
External Network Services in the Oracle Database Security Guide. The Oracle
Database 11g enhancements to the packages increases their security and removes
the need to consider revoking access to them from the PUBLIC user group.
Directories accessible to the UTL _FILE package should be created using the
CREATE DIRECTORY command. Early releases of the UTL_FILE package
relied on the initialization parameter UTL_FILE_DIR to specify the accessible
directories. Usage of the CREATE DIRECTORY command enables finer
granularity and stronger security. For example the following commands create two
directories and authorize DBA group and the user APPUSER to access to access
each.
Depending on the application model, it may be possible to remove grants from the
PUBLIC user group by first making grants directly to the application schema or
end user (depending on the application model) and then revoking the privilege
from the PUBLIC user group. For example, assume an application uses the
database schema APPCT. During install EXECUTE on the APPCT. ADDACCT
AUTHENTICATE CLIENTS
Oracle recommends verifying that the database initialization parameter
REMOTE_OS_AUTHENT is set to FALSE. Setting the value to FALSE creates
a more secure configuration by enforcing server-based authentication of clients
connecting to an Oracle database. The default setting for this parameter is FALSE
and it should not be changed.
Having your EXTPROC agent spawned by Oracle Listener is necessary if you use:
• Multi-threaded Agent
• Oracle Database in MTS mode on Windows
• AGENT clause of the LIBRARY specification or AGENT IN clause of the
PROCECDURE specification such that you can redirect external procedures
to a different EXTPROC agent.
Please refer to the Oracle Net Services Guide for instructions on properly
configuring Oracle Net Services for external procedures.
tcp.validnote_checking = YES
The first parameter turns on the feature whereas the latter parameters respectively
deny or allow specific client IP address from making connections to the Oracle
listener.
Both UNIX and Windows platforms provide a variety of operating system services,
most of which are not necessary for most deployments. Such services include FTP,
TFTP, TELNET and so forth. Be sure to close both the UDP and TCP ports for
each service that is being disabled. Disabling one type of port and not the other
does not make the operating system more secure.
Always apply relevant security patches for both the operating system and Oracle.
Periodically check the Oracle Technology Network (OTN) security site for
details
on security alerts released by Oracle. Also check Oracle Worldwide
Supports services site, Metalink, for detailed on available and upcoming
security related patches and application specific secure configuration
information.
SYSMAN OPEN
SYSTEM OPEN
TSMSYS WK_ TEST WKPROXY WKSYS
EXPI RED
WMSYS
& LOCKED
XDBEXPI RED
XS$NULL EXPI RED& LOCKED
EXPI REDLOCKED
EXPI RED& LOCKED
EXPI RED& LOCKED EXPI RED
Oracle Corporation
World Headquarters
500 Oracle Parkway
Redwood Shores, CA 94065
U.S.A.
Worldwide Inquiries:
Phone: +1.650.506.7000
Fax: +1.650.506.7200
oracle.com