Database audit

As a part of the database audit, it is recommended to perform an audit on the database configuration, schema, users, privileges, and structures. A baseline can be created by using the secure configuration guides produced by the respective manufacturer, and analyzing the gaps present in the configuration. Some of the sample database configuration checks are as follows:

  • Authentication methods
  • Revoking unnecessary privileges and roles from the role public
  • Restricting permissions on runtime facilities
  • Ensuring that TCPs are specified as the PROTOCOL in the ADDRESS parameter in the tnsnames.ora file

Get Network Scanning Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.