MS SQL Server 2014 Database Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
When supporting applications that require security labeling of data, SQL Server must associate organization-defined types of security labels having organization-defined security label values with information in storage.
<VulnDiscussion>Without the association of security labels to information, there is no basis for the DBMS to make security-related access-con...Rule Medium Severity -
SRG-APP-000313-DB-000309
<GroupDescription></GroupDescription>Group -
When supporting applications that require security labeling of data, SQL Server must associate organization-defined types of security labels having organization-defined security label values with information in process.
<VulnDiscussion>Without the association of security labels to information, there is no basis for the DBMS to make security-related access-con...Rule Medium Severity -
SRG-APP-000314-DB-000310
<GroupDescription></GroupDescription>Group -
When supporting applications that require security labeling of data, SQL Server must associate organization-defined types of security labels having organization-defined security label values with information in transmission.
<VulnDiscussion>Without the association of security labels to information, there is no basis for the DBMS to make security-related access-con...Rule Medium Severity -
SRG-APP-000375-DB-000323
<GroupDescription></GroupDescription>Group -
Time stamps in database tables, intended for auditing or activity-tracking purposes, must include both date and time of day, with a minimum granularity of one second.
<VulnDiscussion>If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...Rule Medium Severity -
SRG-APP-000428-DB-000386
<GroupDescription></GroupDescription>Group -
SQL Server must implement and/or support cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest (to include, at a minimum, PII and classified information) on organization-defined information system components.
<VulnDiscussion>Databases holding data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized disc...Rule Medium Severity -
SRG-APP-000447-DB-000393
<GroupDescription></GroupDescription>Group -
When invalid inputs are received, SQL Server must behave in a predictable and documented manner that reflects organizational and system objectives.
<VulnDiscussion>A common vulnerability is unplanned behavior when invalid inputs are received. This requirement guards against adverse or uni...Rule Medium Severity -
SRG-APP-000494-DB-000344
<GroupDescription></GroupDescription>Group -
Trace or Audit records must be generated when categorized information (e.g., classification levels/security levels) is accessed.
<VulnDiscussion>Changes in categorized information must be tracked. Without an audit trail, unauthorized access to protected data could go un...Rule Medium Severity -
SRG-APP-000494-DB-000345
<GroupDescription></GroupDescription>Group -
Trace or Audit records must be generated when unsuccessful attempts to access categorized information (e.g., classification levels/security levels) occur.
<VulnDiscussion>Changes in categorized information must be tracked. Without an audit trail, unauthorized access to protected data could go un...Rule Medium Severity -
SRG-APP-000495-DB-000328
<GroupDescription></GroupDescription>Group -
SQL Server must generate Trace or Audit records when privileges/permissions are modified via locally-defined security objects.
<VulnDiscussion>Changes in the permissions, privileges, and roles granted to users and roles must be tracked. Without an audit trail, unautho...Rule Medium Severity -
SRG-APP-000495-DB-000329
<GroupDescription></GroupDescription>Group -
SQL Server must generate Trace or Audit records when unsuccessful attempts to modify privileges/permissions via locally-defined security objects occur.
<VulnDiscussion>Failed attempts to change the permissions, privileges, and roles granted to users and roles must be tracked. Without an audit...Rule Medium Severity -
SRG-APP-000496-DB-000334
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.