Skip to content

Microsoft Azure SQL Database Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Azure SQL Database must generate audit records for all privileged activities or other system-level access.

    Without tracking privileged activity, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. System documentation...
    Rule Medium Severity
  • Azure SQL Database must generate audit records for all unsuccessful attempts to execute privileged activities or other system-level access.

    Without tracking privileged activity, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. System documentation...
    Rule Medium Severity
  • Azure SQL Database must generate audit records when unsuccessful accesses to objects occur.

    Without tracking all or selected types of access to all or selected objects (tables, views, procedures, functions, etc.), it would be difficult to establish, correlate, and investigate the events r...
    Rule Medium Severity
  • Azure SQL Database must offload audit data to a separate log management facility; this must be continuous and in near real time for systems with a network connection to the storage facility and weekly or more often for stand-alone systems.

    Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common process in information systems with limited audit storage capacity. Az...
    Rule Medium Severity
  • Azure SQL Database must only use approved firewall settings deemed by the organization to be secure, including denying azure services access to the server.

    Use of nonsecure firewall settings, such as allowing azure services to access the server, exposes the system to avoidable threats.
    Rule Medium Severity
  • SRG-APP-000441-DB-000378

    Group
  • SRG-APP-000496-DB-000335

    Group
  • SRG-APP-000023-DB-000001

    Group
  • Azure SQL Databases must integrate with Azure Active Directory for providing account management and automation for all users, groups, roles, and any other principals.

    Enterprise environments make account management for applications and databases challenging and complex. A manual process for account management functions adds the risk of a potential oversight or o...
    Rule High Severity
  • SRG-APP-000033-DB-000084

    Group
  • Azure SQL Database must generate audit records when unsuccessful attempts to delete security objects occur.

    The removal of security objects from the database/DBMS would seriously degrade a system's information assurance posture. If such an action is attempted, it must be logged. To aid in diagnosis, it...
    Rule Medium Severity
  • SRG-APP-000502-DB-000348

    Group
  • SRG-APP-000033-DB-000084

    Group
  • Azure SQL Database must enforce approved authorizations for logical access to server information and system resources in accordance with applicable access control policies.

    Authentication with a DOD-approved PKI certificate does not necessarily imply authorization to access Azure SQL Database. To mitigate the risk of unauthorized access to sensitive information by ent...
    Rule High Severity
  • SRG-APP-000080-DB-000063

    Group
  • Azure SQL Database must protect against a user falsely repudiating by ensuring only clearly unique Active Directory user accounts can connect to the database.

    Nonrepudiation of actions taken is required in order to maintain data integrity. Examples of particular actions taken by individuals include creating information, sending a message, approving infor...
    Rule Medium Severity
  • SRG-APP-000080-DB-000063

    Group
  • Azure SQL Database must protect against a user falsely repudiating by use of system-versioned tables (Temporal Tables).

    Nonrepudiation of actions taken is required in order to maintain data integrity. Examples of particular actions taken by individuals include creating information, sending a message, approving infor...
    Rule Medium Severity
  • SRG-APP-000133-DB-000200

    Group
  • SRG-APP-000133-DB-000362

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules