Skip to Main Content

Infrastructure Software

Announcement

For appeals, questions and feedback about Oracle Forums, please email oracle-forums-moderators_us@oracle.com. Technical questions should be asked in the appropriate category. Thank you!

Enhancing OS security using the Oracle Linux STIG image in Oracle Cloud

Julie Wong-OracleMar 15 2021 — edited Mar 15 2021

Oracle has released the Oracle Linux STIG image for Oracle Cloud Infrastructure (OCI). This image is an Oracle Linux 7 implementation of the Security Technical Implementation Guide (STIG) for OCI. With this image, you can easily create an Oracle Linux instance in OCI that you can configure to match certain security standards and requirements set by the Defense Information Systems Agency (DISA) of the U.S. Department of Defense (DoD).
The Oracle Linux STIG image is scanned against the target DISA STIG Security Content Automation Protocol (SCAP) Benchmark profile. Not all elements of the Oracle Linux 7 STIG are implemented in the image, due to requirements specific to the user environment. The resulting SCAP Compliance Checker (SCC) score is published in the documentation.
Launch a STIG profile instance in minutes
The Oracle Linux STIG image is available on the Oracle Cloud Marketplace and from the embedded Marketplace or Oracle images catalog in the OCI Console. It’s available for deployment in commercial and U.S. government OCI regions.
A screenshot of the Oracle Linux 7 STIG image page in Oracle Cloud Marketplace.
Getting started
Learn more about the Oracle Linux STIG image by visiting the Marketplace listing. For further details on how to deploy the image in OCI, STIG remediation configurations and considerations, and compliance check scanning, refer to the Oracle Linux 7 STIG image deployment and user guide.
You can start by signing up for an OCI account and test driving the Oracle Linux STIG image by deploying it on Oracle Cloud Free Tier or OCI subscription resources. With an Oracle Cloud Infrastructure subscription, you receive enterprise-level Oracle Linux Premier Support at no extra cost.
For more information, refer to the following resources:
Oracle Linux STIG image (Marketplace)
Oracle Linux STIG image deployment and user guide (documentation)
Oracle Linux 7 Security Guide (documentation)
Oracle Linux (web page)

Comments

Mark D Powell
Answer
The package was in use. There are a couple of ways to find who is using a package at any given moment.

You can join v$session to dba_ddl_locks or you can use v$acess but you can see who is executing the package. The code cannot be recompiled while the code is in use.

HTH -- Mark D Powell --
Marked as Answer by 784227 · Sep 27 2020
Helios-GunesEROL
Hi;

For can root cause please see:
How to analyze ORA-04021 or ORA-4020 errors? [ID 169139.1]

Hope it helps

Regard
Helios
784227
Hi,

Thanks for reply.

There are two session id which are access same package in dba_ddl_locks, do i need to kill that session id?

Thanks
oradba
do i need to kill that session id?
I would first try to find out, WHO is behind this id.
Mark D Powell
It would have been nice if you had posted your query and results so we could make suggestions on how to improve the query or what you should check next.

Generally speaking if you submit a create or replace on a package and it takes longer than expected you can open a second session and query for usage. Depending on what you find determines your action.

If may be you just need to re-submit immediately or wait till a batch job completes. There could be a daemon (continuously running batch) job that you have stopped and re-started right after you make the change. It depends on your environment.

HTH -- Mark D Powell --
1 - 5

Post Details

Added on Mar 15 2021
0 comments
98 views