MS SQL Server 2014 Instance Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SQL Server must generate Trace or Audit records when concurrent logons/connections by the same user from different workstations occur.
For completeness of forensic analysis, it is necessary to track who logs on to SQL Server. Concurrent connections by the same user from multiple workstations may be valid use of the system; or suc...Rule Medium Severity -
SQL Server must off-load audit data to a separate log management facility; this must be continuous and in near real time for systems with a network connection to the storage facility and weekly or more often for stand-alone systems.
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity. T...Rule Medium Severity -
Applications must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
To prevent the compromise of authentication information, such as passwords and PINs, during the authentication process, the feedback from the information system must not provide any information tha...Rule High Severity -
SRG-APP-000099-DB-000043
Group -
SRG-APP-000001-DB-000031
Group -
SRG-APP-000119-DB-000060
Group -
SRG-APP-000033-DB-000084
Group -
SQL Server must enforce approved authorizations for logical access to server-level system resources in accordance with applicable access control policies.
Authentication with a DoD-approved PKI certificate does not necessarily imply authorization to access the SQL Server instance and server-level resources. To mitigate the risk of unauthorized acces...Rule Medium Severity -
SRG-APP-000141-DB-000092
Group -
SRG-APP-000090-DB-000065
Group -
Where SQL Server Trace is in use for auditing purposes, SQL Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be traced.
Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent or interfere with the auditing of critical events. ...Rule Medium Severity -
SRG-APP-000090-DB-000065
Group -
SRG-APP-000091-DB-000066
Group -
Where SQL Server Audit is in use, SQL Server must generate audit records when privileges/permissions are retrieved.
The system must monitor who/what is reading privilege/permission/role information. This requirement addresses explicit requests for privilege/permission/role membership information. It does not re...Rule Medium Severity -
SRG-APP-000096-DB-000040
Group -
SQL Server must produce Trace or Audit records containing sufficient information to establish when the events occurred.
Information system auditing capability is critical for accurate forensic analysis. Audit record content which may be necessary to satisfy the requirement of this control includes, but is not limite...Rule Medium Severity -
SRG-APP-000097-DB-000041
Group -
SQL Server must produce Trace or Audit records containing sufficient information to establish where the events occurred.
Information system auditing capability is critical for accurate forensic analysis. Audit record content which may be necessary to satisfy the requirement of this control includes, but is not limite...Rule Medium Severity -
SRG-APP-000098-DB-000042
Group -
SRG-APP-000100-DB-000201
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.