Privilege Management
The chapters in this part explain risk analysis, risk impact, and solutions related to privilege management.
Separation of Development and Operation Systems
Risk Analysis
Risk Impact
Solution
SYSDBA Privilege Control
Risk Analysis
Risk Impact
Solution
Listener Password Setting Check
Risk Analysis
Risk Impact
Solution
Configuration File Protection Check
Risk Analysis
Risk Impact
Solution
Crucial File Ownership or Group Setting Check
Risk Analysis
Risk Impact
Solution
Public Access Control
Risk Analysis
Risk Impact
Solution
The Use of GRANT Option Control
Risk Analysis
Risk Impact
Solution
Revoke privileges
Grant privileges
The Use of ADMIN Option Control
Risk Analysis
Risk Impact
Solution
Revoke Privileges
Grant Privileges
Last updated

