Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Current »

Severity : null

Description : While some ports such as HTTP and HTTPS are required to be open to the public to function properly, more sensitive services such as Autonomous Data Warehouse should be restricted to known IP addresses.

Remediation Steps : Restrict TCP port 1522 to known IP addresses

Severity : Medium

Description: This control ensures that database tools has access to only selected autonomous databases through the security groups from specific IP addresses. It is recommended When creating database connections to an Autonomous Database that is using a private endpoint, create a network security group to provide access from Database Tools to that database.

Remediation Steps:

Perform following to update the security rules in security List :

  1. Login to the OCI console at https://www.oracle.com/cloud/sign-in.html.

  2. In navigation click Networking and then click Virtual Cloud Networks.

  3. Click on the VNC reported.

  4. Under Resources, click Network Security Groups.

  5. Select the security Group for the database resources.

  6. Under Resources, click either Ingress Rules.

  7. To add a rule, click Add Rule.

  8. Keep the rule default setting for stateful rule. Select direction Ingress, Enter the source CIDR for ingress, Select IP protocol as TCP and Destination port Range as 1522.

  9. Click Add.

Important:

Reference:

  • No labels