Oracle and DISA’s security standards

Publish date:

As Oracle databases do often form the center, or foundation, of critical business applications it is important that they are secured to the best abilities and that they are compliant with all the rules and regulations that are applicable to a customer’s situation. To help customers ensure that security and compliancy is implemented as expected […]

As Oracle databases do often form the center, or foundation, of critical business applications it is important that they are secured to the best abilities and that they are compliant with all the rules and regulations that are applicable to a customer’s situation. To help customers ensure that security and compliancy is implemented as expected Oracle provides a compliancy framework from within Oracle Enterprise Manager. 
 
As a new addition to the already existing compliancy standards Oracle has now extended the available compliancy standards with a DISA’s Security Technical Information Guide ( STIG ) for Oracle Database 11.2g Version 1 Release 2 standard. 
 
This means that you can now check and ensure that databases are compliant with the new compliancy standard by using your central Oracle Enterprise Manager implementation. To enable the new compliancy standard you can use the extensibility self update functionality in Oracle Enterprise Manager which will download and apply the functionality for you. 
 
After using the extensibility self update functionality to apply the DISA’s based compliancy standard it will be available to you within the Oracle Enterprise Manager 12C Compliancy Library. 

For more information about this topic, feel free to contact Johan Louwers directly via johan.louwers@capgemini.com

Related Posts

Cybersecurity

Is your Operational Technology (OT) environment insider safe?

Dan Leyman
Date icon September 8, 2020

Organizations need to exercise due diligence and care to ensure their vendors, contractors,...

Cybersecurity

Unlocking the power of AI and SOAR for end-to-end cybersecurity

Geert van der Linden
Date icon September 3, 2020

For AI to work effectively, organizations need to build a roadmap that addresses...

Cybersecurity

Identity access management (IAM) – the new normal

Dino Karanikas
Date icon August 27, 2020

Having an upgraded IAM plan in place will not only let you sleep better at night; it will...