Skip to content

MS SQL Server 2014 Database Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000133-DB-000200

    <GroupDescription></GroupDescription>
    Group
  • Database objects (including but not limited to tables, indexes, storage, stored procedures, functions, triggers, links to software external to SQL Server, etc.) must be owned by database/DBMS principals authorized for ownership.

    &lt;VulnDiscussion&gt;Within the database, object ownership implies full privileges to the owned object, including the privilege to assign access t...
    Rule Medium Severity
  • SRG-APP-000133-DB-000200

    <GroupDescription></GroupDescription>
    Group
  • In a database owned by a login not having administrative privileges at the instance level, the database property TRUSTWORTHY must be OFF unless required and authorized.

    &lt;VulnDiscussion&gt;SQL Server's fixed (built-in) server roles, especially [sysadmin], have powerful capabilities that could cause great harm if ...
    Rule Medium Severity
  • SRG-APP-000133-DB-000200

    <GroupDescription></GroupDescription>
    Group
  • In a database owned by [sa], or by any other login having administrative privileges at the instance level, the database property TRUSTWORTHY must be OFF.

    &lt;VulnDiscussion&gt;SQL Server's fixed (built-in) server roles, especially [sysadmin], have powerful capabilities that could cause great harm if ...
    Rule Medium Severity
  • SRG-APP-000226-DB-000147

    <GroupDescription></GroupDescription>
    Group
  • Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.

    &lt;VulnDiscussion&gt;The purpose of this control is to prevent information, including encrypted representations of information, produced by the ac...
    Rule Medium Severity
  • SRG-APP-000251-DB-000160

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must check the validity of all data inputs except those specifically identified by the organization.

    &lt;VulnDiscussion&gt;Invalid user input occurs when a user inserts data or characters into an application’s data entry fields and the application ...
    Rule Medium Severity
  • SRG-APP-000251-DB-000391

    <GroupDescription></GroupDescription>
    Group
  • The DBMS and associated applications must reserve the use of dynamic code execution for situations that require it.

    &lt;VulnDiscussion&gt;With respect to database management systems, one class of threat is known as SQL Injection, or more generally, code injection...
    Rule Medium Severity
  • SRG-APP-000251-DB-000392

    <GroupDescription></GroupDescription>
    Group
  • The DBMS and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.

    &lt;VulnDiscussion&gt;With respect to database management systems, one class of threat is known as SQL Injection, or more generally, code injection...
    Rule Medium Severity
  • SRG-APP-000266-DB-000162

    <GroupDescription></GroupDescription>
    Group
  • The DBMS and associated applications must provide non-privileged users with error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.

    &lt;VulnDiscussion&gt;Any DBMS or associated application providing too much information in error messages on the screen or printout risks compromis...
    Rule Medium Severity
  • SRG-APP-000267-DB-000163

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must generate Trace or Audit records when successful accesses to designated objects occur.

    &lt;VulnDiscussion&gt;Without tracking all or selected types of access to all or selected objects (tables, views, procedures, functions, etc.), it ...
    Rule Medium Severity
  • SQL Server must reveal detailed error messages only to the ISSO, ISSM (or their designees), SA and DBA.

    &lt;VulnDiscussion&gt;If the DBMS provides too much information in error logs and administrative messages to the screen, this could lead to comprom...
    Rule Medium Severity
  • SRG-APP-000311-DB-000308

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules