Skip to content

MS SQL Server 2014 Instance Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The confidentiality and integrity of information managed by SQL Server must be maintained during reception.

    Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, during aggregation, at protocol transformation points, and during packing/un...
    Rule Medium Severity
  • SRG-APP-000456-DB-000390

    Group
  • Security-relevant software updates to SQL Server must be installed within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).

    Security flaws with software applications, including database management systems, are discovered daily. Vendors are constantly updating and patching their products to address newly discovered secur...
    Rule Medium Severity
  • SRG-APP-000456-DB-000390

    Group
  • SRG-APP-000492-DB-000332

    Group
  • SRG-APP-000492-DB-000333

    Group
  • SQL Server must produce Trace or Audit records when unsuccessful attempts to access security objects occur.

    Changes to the security configuration must be tracked. To aid in diagnosis, it is necessary to keep track of failed attempts in addition to the successful ones. This requirement applies to situat...
    Rule Medium Severity
  • SRG-APP-000495-DB-000326

    Group
  • SQL Server must generate Trace or Audit records when privileges/permissions are added.

    Changes in the permissions, privileges, and roles granted to users and roles must be tracked. Without an audit trail, unauthorized elevation or restriction of privileges could go undetected. Elevat...
    Rule Medium Severity
  • SRG-APP-000495-DB-000327

    Group
  • SQL Server must generate Trace or Audit records when unsuccessful attempts to add privileges/permissions occur.

    Failed attempts to change the permissions, privileges, and roles granted to users and roles must be tracked. Without an audit trail, unauthorized attempts to elevate or restrict privileges could go...
    Rule Medium Severity
  • SRG-APP-000499-DB-000330

    Group
  • SRG-APP-000499-DB-000331

    Group
  • SQL Server must generate Trace or Audit records when unsuccessful attempts to delete privileges/permissions occur.

    Changes in the permissions, privileges, and roles granted to users and roles must be tracked. Without an audit trail, unauthorized elevation or restriction of privileges could go undetected. Elevat...
    Rule Medium Severity
  • SRG-APP-000503-DB-000350

    Group
  • SQL Server must generate Trace or Audit records when successful logons or connections occur.

    For completeness of forensic analysis, it is necessary to track who/what (a user or other principal) logs on to SQL Server. Use of SQL Server Audit is recommended. All features of SQL Server Audit...
    Rule Medium Severity
  • SRG-APP-000503-DB-000351

    Group
  • SQL Server must generate Trace or Audit records when unsuccessful logons or connection attempts occur.

    For completeness of forensic analysis, it is necessary to track failed attempts to log on to SQL Server. While positive identification may not be possible in a case of failed authentication, as muc...
    Rule Medium Severity
  • SRG-APP-000504-DB-000354

    Group
  • SRG-APP-000504-DB-000355

    Group
  • SQL Server must generate Trace or Audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.

    Without tracking privileged activity, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. To aid in diagnosis,...
    Rule Medium Severity
  • SRG-APP-000505-DB-000352

    Group
  • SQL Server must generate Trace or Audit records when logoffs or disconnections occur.

    For completeness of forensic analysis, it is necessary to track who/what (a user or other principal) logs on to and off from SQL Server. Use of SQL Server Audit is recommended. All features of SQ...
    Rule Medium Severity
  • SRG-APP-000506-DB-000353

    Group
  • SRG-APP-000515-DB-000318

    Group
  • SRG-APP-000164-DB-000401

    Group
  • If SQL Server authentication, using passwords, is employed, SQL Server must enforce the DoD standards for password complexity.

    Windows domain/enterprise authentication and identification must be used (SQL4-00-030300). Native SQL Server authentication may be used only when circumstances make it unavoidable; and must be doc...
    Rule Medium Severity
  • SRG-APP-000164-DB-000401

    Group
  • If SQL Server authentication, using passwords, is employed, SQL Server must enforce the DoD standards for password lifetime.

    Windows domain/enterprise authentication and identification must be used (SQL4-00-030300). Native SQL Server authentication may be used only when circumstances make it unavoidable; and must be doc...
    Rule Medium Severity
  • SRG-APP-000178-DB-000083

    Group
  • SRG-APP-000178-DB-000083

    Group
  • When using command-line tools such as SQLCMD in a mixed-mode authentication environment, users must use a logon method that does not expose the password.

    To prevent the compromise of authentication information, such as passwords and PINs, during the authentication process, the feedback from the information system must not provide any information tha...
    Rule High Severity
  • SRG-APP-000516-DB-000363

    Group
  • The SQL Server Browser service must be disabled if its use is not necessary..

    The SQL Server Browser simplifies the administration of SQL Server, particularly when multiple instances of SQL Server coexist on the same computer. It avoids the need to hard-assign port numbers ...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules