Skip to content

MS SQL Server 2014 Instance Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000506-DB-000353

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must generate Trace or Audit records when concurrent logons/connections by the same user from different workstations occur.

    &lt;VulnDiscussion&gt;For completeness of forensic analysis, it is necessary to track who logs on to SQL Server. Concurrent connections by the sam...
    Rule Medium Severity
  • SRG-APP-000515-DB-000318

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must off-load audit data to a separate log management facility; this must be continuous and in near real time for systems with a network connection to the storage facility and weekly or more often for stand-alone systems.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...
    Rule Medium Severity
  • SRG-APP-000164-DB-000401

    <GroupDescription></GroupDescription>
    Group
  • If SQL Server authentication, using passwords, is employed, SQL Server must enforce the DoD standards for password complexity.

    &lt;VulnDiscussion&gt;Windows domain/enterprise authentication and identification must be used (SQL4-00-030300). Native SQL Server authentication ...
    Rule Medium Severity
  • SRG-APP-000164-DB-000401

    <GroupDescription></GroupDescription>
    Group
  • If SQL Server authentication, using passwords, is employed, SQL Server must enforce the DoD standards for password lifetime.

    &lt;VulnDiscussion&gt;Windows domain/enterprise authentication and identification must be used (SQL4-00-030300). Native SQL Server authentication ...
    Rule Medium Severity
  • SRG-APP-000178-DB-000083

    <GroupDescription></GroupDescription>
    Group
  • Applications must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.

    &lt;VulnDiscussion&gt;To prevent the compromise of authentication information, such as passwords and PINs, during the authentication process, the f...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules