You're almost there! Please answer a few more questions for access to the Applications content. Complete registration
Interested in joining? Complete your registration by providing Areas of Interest here. Register

STIG Responses for a DOD client

Hello Oracle gurus. We need to craft Security Technical Implementation Guide (STIG) responses for a Dept of Defense client. Most we have covered but a few remain below that we're unsure of. Any information to help answer these questions is greatly appreciated, especially if you can include references to Oracle sources. Thanks for your assistance.

Q: Does the application  implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission? RULE ID: SV-222597r1117180.

Q: Do applications prevent unauthorized and unintended information transfer via shared system resources? RULE ID: SV-222592r1117173.

Q: Does the application maintain a separate execution domain for each executing process? RULE ID: SV-222591r1117179.

Howdy, Stranger!

Log In

To view full details, sign in.

Register

Don't have an account? Click here to get started!