All associated application files - 'Verify permissions'


Allowing improper access to binaries that directly interface with the Oracle database adds unnecessary risk and increases the attack surface

of the database.

Level 2, Not Scorable

NOTE: Please review the benchmark to ensure target it requires manual verification that all application files have proper ownership and minimal file


Supportive Information

The following resource is also helpful.

This control applies to the following type of system Windows.