Microsoft Azure SQL Database Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000378-DB-000365
<GroupDescription></GroupDescription>Group -
Azure SQL Database must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.
<VulnDiscussion>Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malici...Rule Medium Severity -
SRG-APP-000380-DB-000360
<GroupDescription></GroupDescription>Group -
Azure SQL Database must enforce access restrictions associated with changes to the configuration of the Azure SQL Database server or database(s).
<VulnDiscussion>Failure to provide logical access restrictions associated with changes to configuration may have significant effects on the o...Rule Medium Severity -
SRG-APP-000416-DB-000380
<GroupDescription></GroupDescription>Group -
Azure SQL Database must use NSA-approved cryptography to protect classified information in accordance with the data owners requirements.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The applicatio...Rule High Severity -
SRG-APP-000428-DB-000386
<GroupDescription></GroupDescription>Group -
Azure SQL Database must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest (to include, at a minimum, PII and classified information) on organization-defined information system components.
<VulnDiscussion>Azure SQL Databases handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauth...Rule Medium Severity -
SRG-APP-000429-DB-000387
<GroupDescription></GroupDescription>Group -
Azure SQL Database must map the PKI-authenticated identity to an associated user account.
<VulnDiscussion>The DOD standard for authentication is DOD-approved PKI certificates. Once a PKI certificate has been validated, it must be m...Rule Medium Severity -
Azure SQL Database must implement cryptographic mechanisms preventing the unauthorized disclosure of organization-defined information at rest on organization-defined information system components.
<VulnDiscussion>Azure SQL Databases handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauth...Rule Medium Severity -
SRG-APP-000447-DB-000393
<GroupDescription></GroupDescription>Group -
When invalid inputs are received, the Azure SQL Database must behave in a predictable and documented manner that reflects organizational and system objectives.
<VulnDiscussion>A common vulnerability is unplanned behavior when invalid inputs are received. This requirement guards against adverse or uni...Rule Medium Severity -
SRG-APP-000089-DB-000064
<GroupDescription></GroupDescription>Group -
The Azure SQL Database must be configured to generate audit records for DOD-defined auditable events within all DBMS/database components.
<VulnDiscussion>Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events r...Rule Medium Severity -
SRG-APP-000090-DB-000065
<GroupDescription></GroupDescription>Group -
Azure SQL Database must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
<VulnDiscussion>Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...Rule Medium Severity -
SRG-APP-000091-DB-000066
<GroupDescription></GroupDescription>Group -
The Azure SQL Database must be able to generate audit records when privileges/permissions are retrieved.
<VulnDiscussion>Under some circumstances, it may be useful to monitor who/what is reading privilege/permission/role information. Therefore, i...Rule Medium Severity -
SRG-APP-000091-DB-000325
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.