STIG Responses for a DOD client
Hello Oracle gurus. We need to craft Security Technical Implementation Guide (STIG) responses for a Dept of Defense client. Most we have covered but a few remain below that we're unsure of. Any information to help answer these questions is greatly appreciated, especially if you can include references to Oracle sources. Thanks for your assistance.
Q: Does the application implement cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission? RULE ID: SV-222597r1117180.
Q: Do applications prevent unauthorized and unintended information transfer via shared system resources? RULE ID: SV-222592r1117173.
Q: Does the application maintain a separate execution domain for each executing process? RULE ID: SV-222591r1117179.