Top

Oracle Database Security Risk Assessment

Highly Confidential

This report is a fictitious example

Assessment Date & Time

Date of Data Collection Date of Report Reporter Version
Thu Apr 01 2017 09:57:00 Thu Apr 01 2017 10:07:29 1.0.2 (October 2016) - 7409

Database Identity

Name Platform Database Role Log Mode Created
SAMPLE Linux x86 64-bit PRIMARY ARCHIVELOG Mon Mar 25 2013 17:24:00

Summary

Section Pass Evaluate Opportunity Some Risk Significant Risk Severe Risk Total Findings
Basic Information 0 0 0 0 0 1 1
User Accounts 3 0 0 2 3 2 10
Privileges and Roles 5 13 0 0 0 0 18
Authorization Control 0 0 1 0 0 0 1
Data Encryption 0 1 1 0 0 0 2
Fine-Grained Access Control 0 0 2 0 0 0 2
Auditing 3 3 2 0 3 0 11
Database Configuration 3 4 0 2 2 1 12
Network Configuration 1 0 0 1 3 0 5
Operating System 2 1 0 1 1 0 5
Total 17 22 6 6 12 4 67

Basic Information

Database Version

Oracle Database 11g Enterprise Edition Release 11.2.0.3.0 - 64bit Production
Security options used: (none)

Security Features

Feature Currently Used
AUTHORIZATION CONTROL
Database Vault No
DATA ENCRYPTION
Column Encryption No
Tablespace Encryption No
Network Encryption No
FINE-GRAINED ACCESS CONTROL
Virtual Private Database No
Label Security No
AUDITING
Traditional Audit Yes
Fine Grained Audit No
USER AUTHENTICATION
External Authentication No
Global Authentication No

Patch Check

User Accounts

Note: Predefined Oracle accounts which are locked are not included in this report. To include all user accounts, run the report with the -a option.

User Accounts

User Name Status Profile Tablespace Predefined Type
APEX_030200 EXPIRED & LOCKED DEFAULT SYSAUX No PASSWORD
CHKMON OPEN DEFAULT SYSTEM No PASSWORD
DBMON_APDYN OPEN DEFAULT USERS No PASSWORD
BCK_DBA OPEN DEFAULT USERS No PASSWORD
META_N OPEN DEFAULT SYSTEM No PASSWORD
PERFSTAT OPEN DEFAULT USERS Yes PASSWORD
SAR OPEN DEFAULT SAR_TBL No PASSWORD
SAR_ANAGRAF OPEN DEFAULT SAR_ANAGRAF_TBL No PASSWORD
SAR_ANAGRAF_RW OPEN DEFAULT SAR_ANAGRAF_RW_TBL No PASSWORD
SAR_CIL_ASL OPEN DEFAULT SAR_CIL_ASL_TBL No PASSWORD
SAR_CIL_ASL_RW OPEN DEFAULT SAR_CIL_ASL_RW_TBL No PASSWORD
SAR_CONSOLE OPEN DEFAULT SAR_CONSOLE_TBL No PASSWORD
SAR_CONSOLE_CIL_ASL OPEN DEFAULT SAR_CONSOLE_CIL_ASL_TBL No PASSWORD
SAR_CUP OPEN DEFAULT SAR_CUP_TBL No PASSWORD
SAR_G2CLIN OPEN DEFAULT SAR_G2CLIN_TBL No PASSWORD
SAR_INDICE OPEN DEFAULT SAR_INDICE_TBL No PASSWORD
SAR_INDICE_RW OPEN DEFAULT SAR_INDICE_RW_TBL No PASSWORD
SAR_PUB OPEN DEFAULT SAR_PUB_TBL No PASSWORD
SAR_PUB_RW OPEN DEFAULT SAR_PUB_RW_TBL No PASSWORD
SAR_RW OPEN DEFAULT SAR_RW_TBL No PASSWORD
SAR_STORIC OPEN DEFAULT SAR_STORIC_TBL No PASSWORD
SAR_STORIC_RW OPEN DEFAULT SAR_STORIC_RW_TBL No PASSWORD
SYS OPEN DEFAULT SYSTEM Yes PASSWORD
SYSTEM OPEN DEFAULT SYSTEM Yes PASSWORD

User Accounts in SYSTEM or SYSAUX Tablespace

Sample Schemas

Case-Sensitive Passwords

Users with Expired Passwords

Users with Default Passwords

Minimum Client Authentication Version

Password Verifiers

User Profiles

Profile Name Resource Value
DEFAULT (Number of Users) 29
DEFAULT CONNECT_TIME UNLIMITED
DEFAULT FAILED_LOGIN_ATTEMPTS 10
DEFAULT IDLE_TIME UNLIMITED
DEFAULT PASSWORD_GRACE_TIME UNLIMITED
DEFAULT PASSWORD_LIFE_TIME UNLIMITED
DEFAULT PASSWORD_LOCK_TIME UNLIMITED
DEFAULT PASSWORD_REUSE_MAX UNLIMITED
DEFAULT PASSWORD_REUSE_TIME UNLIMITED
DEFAULT PASSWORD_VERIFY_FUNCTION NULL

Users with Unlimited Password Lifetime

Users with Unlimited Failed Login Attempts

Password Verification Functions

Privileges and Roles

All System Privileges

All Roles

Account Management Privileges

Privilege Management Privileges

Audit Management Privileges

Data Access Privileges

Access Control Exemption Privileges

Access to Password Verifier Tables

Access to Restricted Objects

User Impersonation

Data Exfiltration

System Privileges Granted to PUBLIC

Roles Granted to PUBLIC

Column Privileges Granted to PUBLIC

DBA Role

Other Powerful Roles

Java Permissions

Users with Administrative Privileges

Authorization Control

Database Vault

Data Encryption

Transparent Data Encryption

Encryption Key Wallet

Fine-Grained Access Control

Virtual Private Database

Label Security

Auditing

Audit Records

Statement Audit

Object Audit

Privilege Audit

Administrative User Audit

Privilege Management Audit

Account Management Audit

Database Management Audit

Privilege Usage Audit

Database Connection Audit

Fine Grained Audit

Database Configuration

Initialization Parameters for Security

Name Value
AUDIT_FILE_DEST /o11xxx/app/oracle/admin/SAMPLE/adump
AUDIT_SYSLOG_LEVEL
AUDIT_SYS_OPERATIONS FALSE
AUDIT_TRAIL DB
COMPATIBLE 11.2.0.0.0
DISPATCHERS (PROTOCOL=TCP) (SERVICE=SAMPLEXDB)
GLOBAL_NAMES FALSE
LDAP_DIRECTORY_ACCESS NONE
LDAP_DIRECTORY_SYSAUTH no
O7_DICTIONARY_ACCESSIBILITY FALSE
OS_AUTHENT_PREFIX ops$
OS_ROLES FALSE
REMOTE_LISTENER
REMOTE_LOGIN_PASSWORDFILE EXCLUSIVE
REMOTE_OS_AUTHENT FALSE
REMOTE_OS_ROLES FALSE
RESOURCE_LIMIT FALSE
SEC_CASE_SENSITIVE_LOGON FALSE
SEC_MAX_FAILED_LOGIN_ATTEMPTS 10
SEC_PROTOCOL_ERROR_FURTHER_ACTION CONTINUE
SEC_PROTOCOL_ERROR_TRACE_ACTION TRACE
SEC_RETURN_SERVER_RELEASE_BANNER FALSE
SQL92_SECURITY FALSE
UTL_FILE_DIR

Access to Dictionary Objects

Inference of Table Data

Network Communications

External Authorization

File System Access

Triggers

Disabled Constraints

External Procedures

Directory Objects

Database Links

Network Access Control

XML Database Access Control

Network Configuration

Network Encryption

Client Nodes

SQLNET Banners

Network Listener Configuration

Listener Logging Control

Operating System

OS Authentication

Process Monitor Process

Agent Processes

Listener Processes

File Permissions in ORACLE_HOME

Diagnostics

Skipped Inactive Users

Skipped Privilege Analysis

Skipped ENCRYPT_NEW_TABLESPACES Parameter Check

Skipped Redaction Policies

Skipped RAS Policies

Skipped TSDP Policies

Skipped Unified Audit Policies


This report is focused on detecting areas of potential security vulnerabilities or misconfigurations and providing recommendations on how to mitigate those potential vulnerabilities.

The report provides a view on the current status. These recommendations are provided for informational purposes only and should not be used as a substitute for a thorough analysis or interpreted to contain any legal or regulatory advice or guidance.

You are solely responsible for your system, and the data and information gathered during the production of this report. You are also solely responsible for the execution of software to produce this report, and for the effect and results of the execution of any mitigating actions identified herein.

Oracle provides this analysis on an "as is" basis without warranty of any kind and Oracle hereby disclaims all warranties and conditions whether express, implied or statutory.