Control
Objective
Control Activity
Test of Control
Conclusion
Signoff
the client’s list of objects , which they consider critical or
sensitive. Cooperation with
management, data owners, and/or database administrators should be sought
when
completing this reconciliation.
Compare the list obtained in step 2 with the list obtained in step 3 and
check for
reasonableness.
4. A check must be done to identify the actual object auditing options,
which have been
implemented in the database. All critical database objects should be
audited. To verify
auditing options, run the following SQL commands:
SELECT alt, aud, com, del, gra, ind, ins, loc, ren, sel, upd, ref, exe,
cre, rea, wri
FROM sys.dba_obj_audit_opts
WHERE object_name = UPPER('&object_name');
This SQL statement should be repeated for ALL objects which have been
identified as
critical from step 2 above. This query will prompt for an input
parameter "input_role"
which should be entered as the name of the object of interest. In
SQL*PLUS, once the
SQL statement is entered, it is stored in the buffer and can be
re-executed by simply
entering the forward slash (‘/’) and pressing <ENTER>.
Evaluate the list of auditing options for each critical object being
tested to see if they
are appropriate. The return values for the above query will involve a
list of auditing
options. Each of the list members represents the first three letters of
the audited
command: ALT = alter, AUD = audit,
COM = comment, DEL = delete, GRA = grant,
IND = index, INS = insert, LOC = lock, REN = rename, SEL = select, UPD =
update,
REF = references, EXE = execute, CRE = create, REA = read, WRI = write.
The
auditing options for each audited command will be represented by a 3
character value.
The first character represents the option for a command that is executed
successfully.
The second character is always a slash ('/') and is a separator. The
third character
represents the option for a command that is executed unsuccessfully. The
first and third
digits can be one of 3 values: A dash ('-') for 'none', an 'S' for 'by
session', and an 'A' for
'by Access'. 'By session' means that when a command is executed, it is
audited only
once (the first time) during the lifetime of the open user session. 'By
access' means that
the command will be audited each time it is executed. For example, the
value '-/-' would
mean that no auditing would occur for the associated command. The value
of '-/A'
would mean that an auditing record will not occur whenever the command
is
successfully issued but will occur every time (by access) that the
command is not
successfully executed. The value of 'A/S' would mean that an auditing
record would be
created every time (by access) the command is successfully executed and
only once per
session (by session) whenever the command is not successfully executed.
For further
explanation, please refer to Oracle
Reference documentation.