Oracle Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.

Severity
Group ID
Group Title
Version
Rule ID
Date
STIG Version
mediumV-270577SRG-APP-000243-DB-000128O19C-00-017400SV-270577r1065009_rule2025-02-141
Description
Applications, including database management systems (DBMSs), must prevent unauthorized and unintended information transfer via shared system resources. Data used for the development and testing of applications often involves copying data from production. It is important that specific procedures exist for this process, to include the conditions under which such transfer may take place, where the copies may reside, and the rules for ensuring sensitive data are not exposed. Copies of sensitive data must not be misplaced or left in a temporary location without the proper controls.
ℹ️ Check
Review the procedures for the refreshing of development/test data from production. Review any scripts or code that exists for the movement of production data to development/test systems, or to any other location or for any other purpose. Verify that copies of production data are not left in unprotected locations. If the code that exists for data movement does not comply with the organization-defined data transfer policy and/or fails to remove any copies of production data from unprotected locations, this is a finding. If sensitive data is included in the exports and no procedures are in place to remove or modify the data to render it not sensitive prior to import into a development database or policy and procedures are not in place to ensure authorization of development personnel to access sensitive information contained in production data, this is a finding.
✔️ Fix
Restrict accessibility of Oracle system tables and other configuration information or metadata to database administrators (DBAs) or other authorized users. Modify any code used for moving data from production to development/test systems to comply with the organization-defined data transfer policy, and to ensure copies of production data are not left in unsecured locations. Implement policy and procedures to modify or remove sensitive information in production exports prior to import into development databases.