MS SQL Server 2014 Instance Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SQL Server must produce Trace or Audit records containing sufficient information to establish the sources (origins) of the events.
<VulnDiscussion>Information system auditing capability is critical for accurate forensic analysis. Audit record content which may be necessar...Rule Medium Severity -
SRG-APP-000099-DB-000043
<GroupDescription></GroupDescription>Group -
SRG-APP-000001-DB-000031
<GroupDescription></GroupDescription>Group -
The audit information produced by SQL Server must be protected from unauthorized read access.
<VulnDiscussion>If audit data were to become compromised, competent forensic analysis and discovery of the true source of potentially malicio...Rule Medium Severity -
SRG-APP-000119-DB-000060
<GroupDescription></GroupDescription>Group -
The number of concurrent SQL Server sessions for each system account must be limited.
<VulnDiscussion>A variety of technologies exist to limit or, in some cases, eliminate the effects of DoS attacks. For example, boundary prote...Rule Medium Severity -
SRG-APP-000033-DB-000084
<GroupDescription></GroupDescription>Group -
SQL Server must enforce approved authorizations for logical access to server-level system resources in accordance with applicable access control policies.
<VulnDiscussion>Authentication with a DoD-approved PKI certificate does not necessarily imply authorization to access the SQL Server instance...Rule Medium Severity -
SRG-APP-000141-DB-000092
<GroupDescription></GroupDescription>Group -
SQL Server default account [sa] must have its name changed.
<VulnDiscussion>SQL Server's [sa] account has special privileges required to administer the database. The [sa] account is a well-known SQL Se...Rule Low Severity -
SRG-APP-000090-DB-000065
<GroupDescription></GroupDescription>Group -
Where SQL Server Trace is in use for auditing purposes, SQL Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be traced.
<VulnDiscussion>Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...Rule Medium Severity -
SRG-APP-000090-DB-000065
<GroupDescription></GroupDescription>Group -
Where SQL Server Audit is in use, SQL Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited at the server level.
<VulnDiscussion>Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...Rule Medium Severity -
SRG-APP-000091-DB-000066
<GroupDescription></GroupDescription>Group -
Where SQL Server Audit is in use, SQL Server must generate audit records when privileges/permissions are retrieved.
<VulnDiscussion>The system must monitor who/what is reading privilege/permission/role information. This requirement addresses explicit reque...Rule Medium Severity -
SRG-APP-000096-DB-000040
<GroupDescription></GroupDescription>Group -
SQL Server must produce Trace or Audit records containing sufficient information to establish when the events occurred.
<VulnDiscussion>Information system auditing capability is critical for accurate forensic analysis. Audit record content which may be necessar...Rule Medium Severity -
SRG-APP-000097-DB-000041
<GroupDescription></GroupDescription>Group -
SQL Server must produce Trace or Audit records containing sufficient information to establish where the events occurred.
<VulnDiscussion>Information system auditing capability is critical for accurate forensic analysis. Audit record content which may be necessar...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.