Details
Allowing improper access to binaries that directly interface with the Oracle database adds unnecessary risk and increases the attack surface
of the database.
Level 2, Not Scorable
NOTE: Please review the benchmark to ensure target compliance.as it requires manual verification that all application files have proper ownership and minimal file
permissions.
Supportive Information
The following resource is also helpful.
This control applies to the following type of system Windows.
Comments
Please sign in to leave a comment.