Skip to content

MS SQL Server 2014 Instance Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000141-DB-000091

    Group
  • SRG-APP-000141-DB-000091

    Group
  • SRG-APP-000141-DB-000091

    Group
  • SRG-APP-000141-DB-000091

    Group
  • Access to database files must be limited to relevant processes and to authorized, administrative users.

    Applications, including DBMSs, must prevent unauthorized and unintended information transfer via shared system resources. Permitting only DBMS processes and authorized, administrative users to have...
    Rule Medium Severity
  • SRG-APP-000295-DB-000305

    Group
  • SRG-APP-000141-DB-000092

    Group
  • SRG-APP-000141-DB-000092

    Group
  • SRG-APP-000141-DB-000093

    Group
  • SRG-APP-000142-DB-000094

    Group
  • SRG-APP-000142-DB-000094

    Group
  • SRG-APP-000148-DB-000103

    Group
  • SRG-APP-000180-DB-000115

    Group
  • SRG-APP-000211-DB-000122

    Group
  • SRG-APP-000233-DB-000124

    Group
  • SRG-APP-000080-DB-000063

    Group
  • SQL Server must protect against an individual using a shared account from falsely denying having performed a particular action.

    Non-repudiation of actions taken is required in order to maintain application integrity. Examples of particular actions taken by individuals include creating information, sending a message, approvi...
    Rule Medium Severity
  • SRG-APP-000231-DB-000154

    Group
  • The Service Master Key must be backed up, stored offline and off-site.

    Backup and recovery of the Service Master Key may be critical to the complete recovery of the database. Not having this key can lead to loss of data during recovery.
    Rule Medium Severity
  • SRG-APP-000023-DB-000001

    Group
  • SQL Server authentication and identity management must be integrated with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.

    Enterprise environments make account management for applications and databases challenging and complex. A manual process for account management functions adds the risk of a potential oversight or o...
    Rule Medium Severity
  • SRG-APP-000091-DB-000325

    Group
  • SRG-APP-000109-DB-000321

    Group
  • SRG-APP-000133-DB-000362

    Group
  • SRG-APP-000179-DB-000114

    Group
  • SRG-APP-000243-DB-000374

    Group
  • SRG-APP-000340-DB-000304

    Group
  • SQL Server must prevent non-privileged users from executing privileged functionality, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.

    Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. System ...
    Rule Medium Severity
  • SRG-APP-000342-DB-000302

    Group
  • Execution of software modules (to include stored procedures, functions, and triggers) with elevated privileges must be restricted to necessary cases only.

    In certain situations, to provide required functionality, a DBMS needs to execute internal logic (stored procedures, functions, triggers, etc.) and/or external code modules with elevated privileges...
    Rule Medium Severity
  • SRG-APP-000356-DB-000314

    Group
  • SQL Server must utilize centralized management of the content captured in audit records generated by all components of the DBMS.

    Without the ability to centrally manage the content captured in the audit records, identification, troubleshooting, and correlation of suspicious behavior would be difficult and could lead to a del...
    Rule Medium Severity
  • SRG-APP-000357-DB-000316

    Group
  • SRG-APP-000359-DB-000319

    Group
  • SQL Server, the operating system, or the storage system must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75% of maximum audit record storage capacity.

    Organizations are required to use a central log management system, so, under normal conditions, the audit space allocated to SQL Server on its own server will not be an issue. However, space will s...
    Rule Medium Severity
  • SRG-APP-000360-DB-000320

    Group
  • SQL Server or software monitoring SQL Server must provide an immediate real-time alert to appropriate support staff of all audit log failures.

    It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without a real-time alert, security personnel may be unaware of an impe...
    Rule Medium Severity
  • SRG-APP-000374-DB-000322

    Group
  • SQL Server must produce time stamps that can be mapped to Coordinated Universal Time (UTC, formerly GMT).

    If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis, in audit files, trace files/tables, and application data tables. Ti...
    Rule Medium Severity
  • SRG-APP-000378-DB-000365

    Group
  • SRG-APP-000380-DB-000360

    Group
  • SQL Server and Windows must enforce access restrictions associated with changes to the configuration of the SQL Server instance or database(s).

    Failure to provide logical access restrictions associated with changes to configuration may have significant effects on the overall security of the system. When dealing with access restrictions p...
    Rule Medium Severity
  • SRG-APP-000381-DB-000361

    Group
  • SQL Server must produce Trace or Audit records of its enforcement of access restrictions associated with changes to the configuration of the DBMS or database(s).

    Without auditing the enforcement of access restrictions against changes to configuration, it would be difficult to identify attempted attacks and an audit trail would not be available for forensic ...
    Rule Medium Severity
  • SRG-APP-000383-DB-000364

    Group
  • SQL Server must disable communication protocols not required for operation.

    Having unnecessary protocols enabled exposes the system to avoidable threats. In a typical installation, only TCP/IP will be required.
    Rule Medium Severity
  • SRG-APP-000429-DB-000387

    Group
  • SRG-APP-000441-DB-000378

    Group
  • The confidentiality and integrity of information managed by SQL Server must be maintained during preparation for transmission.

    Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, including, for example, during aggregation, at protocol transformation points, an...
    Rule Medium Severity
  • SRG-APP-000442-DB-000379

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules