6.1.2 Information Flow Enforcement
The application validates the request XML files. If malicious data entry is found in the body of the XML file, such files are filtered out from further processing. The Java classes in the front end calls the back end PLSQL packages for further processing.
PLSQL level validations are in place in the database server. Exclusive use of bind variables and calls to Oracle's DBMS_ASSERT package sanitize the data. The passwords and other important details are encrypted using AES256 logic.
Parent topic: User Management