Access Control Audit Procedures APG
Access Control Audit Procedures APG
Client: WP Ref:
Meeting: Prepared By:
Staff: Date:
Database: Reviewed By:
Database Version: Date:
Background:
Table of Contents
1.DATABASE ADMINISTRATION....................................................................................................................2
2.USER AUTHENTICATION..............................................................................................................................3
4.DATABASE COMMUNICATION.................................................................................................................12
6.OPERATING SYSTEM...................................................................................................................................15
Page 1 of 17
Oracle Database Audit Program
March 2003 - V1.1
1. DATABASE ADMINISTRATION
Test Approach Results & Recommendations
Topic
1.1. Who has overall responsibility for Oracle
database administration?
Page 2 of 17
Oracle Database Audit Program
March 2003 - V1.1
2. USER AUTHENTICATION
Test Approach Results & Recommendations
Topic
2.1. Identify the database authentication
model that is used:
• Operating system authentication
• Network Authentication
• Database Authentication.
2.2. Are all new Oracle database accounts Interview database administrators.
authorized by appropriate management?
SQL Statement:
select * from DBA_SYS_PRIVS;
2.6. Are shared database accounts used Review database user list to identify shared
Page 3 of 17
Oracle Database Audit Program
March 2003 - V1.1
2. USER AUTHENTICATION
Test Approach Results & Recommendations
Topic
(e.g. DEVELOPER, DBA etc.)? database accounts.
2.10. Ensure that the utilities SQL*Plus, Review of operating system level access rights
Server Manager, and Listener Control to executables for the utilities listed at the left.
cannot be executed by inappropriate
staff. Interviews with DBAs.
Page 4 of 17
Oracle Database Audit Program
March 2003 - V1.1
2. USER AUTHENTICATION
Test Approach Results & Recommendations
Topic
2.12. Review access to stored procedures to SQL statement:
ensure users cannot execute stored
procedures that go beyond the Select * from DBA_TAB_PRIVS;
authorization of which users are
permitted to perform. Review output to determine whether end users
have been granted “Execute” privileges on any
stored procedures. If so, enquire of DBA
The user inherits access privileges of regarding the functions performed by the stored
the creator of the stored procedure or procedure.
the trigger. Therefore, permission to
execute a stored procedure or a trigger Interviews with DBAs
gives a user indirect access to
underlying database objects.
2.13. Verify that passwords for the following Review output of password test script.
default database user accounts have
been changed
(ACCOUNT/PASSWORD). NOTE:
Depending on the version and options
installed, the database may list fewer or
different default users:
• SYS/CHANGE_ON_INSTALL
• SYSTEM/MANAGER
• SCOTT/TIGER
• APPS/APPS
• DBSNMP/DBSNMP
• TRACESVR/TRACE**
• CTXSYS/CTXSYS**
• MDSYS/MDSYS**
• DEMO/DEMO**
• CTXDEMO/CTXDEMO**
• APPLSYS/FND**
• PO8/PO8**
• NAMES/NAMES**
• SYSADM/SYSADM**
• ORDPLUGINS/ORDPLUGINS**
• OUTLN/OUTLN
• ADAMS/WOOD**
• BLAKE/PAPER**
Page 5 of 17
Oracle Database Audit Program
March 2003 - V1.1
2. USER AUTHENTICATION
Test Approach Results & Recommendations
Topic
• JONES/STEEL**
• CLARK/CLOTH**
• ORDSYS/ORDSYS**
• MTSSYS/MTSSYS**
2.14. Determine whether the following account Review list if database users to determine if the
is used: AURORA$ORB$UNAUTHENTICATED user
AURORA$ORB$UNAUTHENTICATED/ account is being used.
[RANDOMLY GENERATED]
2.15. Are there any ops$ accounts used in the Review list if database users to search for any
database? account with an “ops$” prefix.
If yes, has remote authentication been Review the parameter values and review with
disabled? (see V$PARAMETER key client personnel to determine if remote
settings) authentication has been disabled.
2. USER AUTHENTICATION
Test Approach Results & Recommendations
Topic
• PASSWORD_LIFE_TIME (number of
days password can be used)
• PASSWORD_REUSE_TIME (number
of days before a password can be re-
used. If set then
password_resuse_max must be set to
UNLIMITED)
• PASSWORD_REUSE_MAX (number
of password changes required before
current password can be re-used. If
set then password_resuse_time must
be set to UNLIMITED)
• PASSWORD_LOCK_TIME (time an
account remains locked after failed
login attempts)
• PASSWORD_GRACE_TIME (days
before password expiration that a
warning is used to change password)
• PASSWORD_VERIFY_FUNCTION (a
script that may be run to verify the
strength of the password)
2.17. Determine if database parameters are Determine if the selected parameters are set
set securely. securely.
• O7_DICTIONARY_ACCESSABILITY
(set to FALSE) Review the list of parameter values with client
• OS_AUTHENT_PREFIX (usually personnel to determine if the settings are
empty string, but may be ops$ or other appropriate.
value)
• REMOTE_OS_AUTHENT (set to
FALSE)
• REMOTE_OS_ROLES (set to
FALSE)
• OS_ROLES (set to FALSE)
• AUDIT_TRAIL (set to DB or OS or
TRUE to enable auditing)
• DBLINK_ENCRYPT_LOGIN (set to
true)
• LICENSE_MAX_SESSIONS /
Page 7 of 17
Oracle Database Audit Program
March 2003 - V1.1
2. USER AUTHENTICATION
Test Approach Results & Recommendations
Topic
LICENSE_MAX_USERS (set to a
value consistent with the terms of the
license agreement with Oracle).
2.18. The practice of authenticating remotely Review parameter values to determine if the
via host based authentication is not to REMOTE_OS_AUTHENT parameter has been
be permitted. set to FALSE.
2.19. Account names and passwords are not Inquiry of database administrator.
embedded in scripts or other
applications where they may be
discovered in clear text or deciphered.
SQL Statement:
2. USER AUTHENTICATION
Test Approach Results & Recommendations
Topic
been granted the privileges to perform the task
in question on all tables within the database.
Transport_order_dtl
Transport_order_hdr
Shipment
Load
User_enrollment
C) SQL Statement:
2. USER AUTHENTICATION
Test Approach Results & Recommendations
Topic
TABLE, DELETE ANY TABLE, DROP ANY
TABLE, INSERT ANY TABLE, SELECT ANY
TABLE, and UPDATE ANY TABLE privileges.
These privileges allow users and roles that have
been granted the privileges to perform the task
in question on all tables within the database.
Page 10 of 17
Oracle Database Audit Program
March 2003 - V1.1
3.3. Is access to the development database Identify developers and their logon ID.
restricted to developers?
Determine if the development database is
restricted to the identified developers.
3.4. Does development staff have access to Identify developers and their logon ID.
the production database?
Determine if the development staff have logical
access to the production databases.
3.5. What DBA activities are tested in the Inquiry of database administrators.
test environment:
• User account Access
• Performance Problems
• Application performance
• Data Volumes
• Conversion Testing
Page 11 of 17
Oracle Database Audit Program
March 2003 - V1.1
4. DATABASE COMMUNICATION
Test Approach Results & Recommendations
Topic
4.1. Determine if SQL*net is used for Inquiry of database administrators.
database communication.
Page 12 of 17
Oracle Database Audit Program
March 2003 - V1.1
5.2. Determine if auditing is enabled and if Review the parameter values for
the logs are written to the operating AUDIT_TRAIL.
system or to the database.
The settings can be as follows:
• NONE (no auditing)
• FALSE (no auditing)
• DB (audit trail will be written to the table
SYS.AUD$)
• TRUE (audit trail will be written to the
table SYS.AUD$)
• OS (audit trail will be written to
operating system files)
Page 14 of 17
Oracle Database Audit Program
March 2003 - V1.1
6. OPERATING SYSTEM
Test Approach Results & Recommendations
Topic
6.1. Review the security of the Oracle Examine Unix access rights to ensure that only
database owner ID and group (Unix) to database administrators belong to the dba
ensure that use is restricted to group.
authorized system administration
personnel and processes. Inquiry to determine who the accounts
belonging to the dba group belonged to.
Ensure that use of the Oracle account is
restricted to the database administrator.
6.2. Review the access settings for the Examine Unix access rights for the executables
following database utilities to ensure listed to the left to determine who is able to
they cannot be executed by the world or execute the utilities.
inappropriate users (the expected paths
to these utilities are listed):
• [product]/[version]/bin/SQLplus
• [product]/[version]/bin/lsnrctl
• [product]/[version]/bin/svrmgrl
• [product]/[version]/bin/sqlload
6.3. Review the access settings for the Examine Unix access rights to the files at the
following database control files and left to ensure that only appropriate personnel
ensure they can only be changed by are able to access the files.
authorized users:
• sqlnet.ora
• init.ora
Page 15 of 17
Oracle Database Audit Program
March 2003 - V1.1
6. OPERATING SYSTEM
Test Approach Results & Recommendations
Topic
• lsnrctl.ora
6.4. Verify that application files are stored on Interview database administrators.
the recommended drives/devices, to
protect the system database since it Review Unix file permissions on files and
contains all system data and to protect directories in the Oracle installation to ensure
the audit database. that access rights are appropriately configured.
6.5. If auditing is enabled, and audit trials are Review OS file permissions.
written to the OS (see 5.2), then access
should be limited to authorized
personnel.
6.6. Determine whether the UNIX process Review Unix access permissions to determine
command (ps) is restricted at the whether the ps command is restricted.
operating system level, so that a user
cannot see the Oracle password in clear
text that occurs with the ps command
when a user starts SQLPlus or another
program with a username/password
Page 16 of 17
Oracle Database Audit Program
March 2003 - V1.1
6. OPERATING SYSTEM
Test Approach Results & Recommendations
Topic
connect string.
6.7. Ensure that Oracle online redo log files Review Unix access permissions to the redo log
are appropriately secured at the files.
operating system level. Ensure that:
• The world cannot write, read or
execute
• Group access is limited to database
administrators
• The owner is an Oracle owner
6.8. Ensure that Oracle related scripts are Review Unix access permissions for Oracle
appropriately secured at the operating related scripts.
system level.
Page 17 of 17