Skip to content

Microsoft Azure SQL Database Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Azure SQL Database must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest (to include, at a minimum, PII and classified information) on organization-defined information system components.

    <VulnDiscussion>Azure SQL Databases handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauth...
    Rule High Severity
  • SRG-APP-000429-DB-000387

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000101-DB-000044

    <GroupDescription></GroupDescription>
    Group
  • When invalid inputs are received, the Azure SQL Database must behave in a predictable and documented manner that reflects organizational and system objectives.

    &lt;VulnDiscussion&gt;A common vulnerability is unplanned behavior when invalid inputs are received. This requirement guards against adverse or uni...
    Rule Medium Severity
  • SRG-APP-000089-DB-000064

    <GroupDescription></GroupDescription>
    Group
  • The Azure SQL Database must be configured to generate audit records for DOD-defined auditable events within all DBMS/database components.

    &lt;VulnDiscussion&gt;Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events r...
    Rule Medium Severity
  • SRG-APP-000090-DB-000065

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.

    &lt;VulnDiscussion&gt;Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...
    Rule Medium Severity
  • SRG-APP-000091-DB-000066

    <GroupDescription></GroupDescription>
    Group
  • The Azure SQL Database must be able to generate audit records when privileges/permissions are retrieved.

    &lt;VulnDiscussion&gt;Under some circumstances, it may be useful to monitor who/what is reading privilege/permission/role information. Therefore, i...
    Rule Medium Severity
  • SRG-APP-000091-DB-000325

    <GroupDescription></GroupDescription>
    Group
  • The Azure SQL Database must be able to generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.

    &lt;VulnDiscussion&gt;Under some circumstances, it may be useful to monitor who/what is reading privilege/permission/role information. Therefore, i...
    Rule Medium Severity
  • Azure SQL Database must include additional, more detailed, organization-defined information in the audit records for audit events identified by type, location, or subject.

    &lt;VulnDiscussion&gt;Information system auditing capability is critical for accurate forensic analysis. Reconstruction of harmful events or forens...
    Rule Medium Severity
  • SRG-APP-000118-DB-000059

    <GroupDescription></GroupDescription>
    Group
  • The audit information produced by Azure SQL Database must be protected from unauthorized read access.

    &lt;VulnDiscussion&gt;If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially ma...
    Rule Medium Severity
  • SRG-APP-000119-DB-000060

    <GroupDescription></GroupDescription>
    Group
  • The audit information produced by Azure SQL Database must be protected from unauthorized modification.

    &lt;VulnDiscussion&gt;If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially ma...
    Rule Medium Severity
  • SRG-APP-000120-DB-000061

    <GroupDescription></GroupDescription>
    Group
  • The audit information produced by Azure SQL Database must be protected from unauthorized deletion.

    &lt;VulnDiscussion&gt;If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially ma...
    Rule Medium Severity
  • SRG-APP-000141-DB-000090

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database default demonstration and sample databases, database objects, and applications must be removed.

    &lt;VulnDiscussion&gt;Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, pr...
    Rule Medium Severity
  • SRG-APP-000142-DB-000094

    <GroupDescription></GroupDescription>
    Group
  • The Azure SQL Database must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

    &lt;VulnDiscussion&gt;To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...
    Rule Medium Severity
  • SRG-APP-000148-DB-000103

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).

    &lt;VulnDiscussion&gt;To ensure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...
    Rule Medium Severity
  • SRG-APP-000177-DB-000069

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must map the PKI-authenticated identity to an associated user account.

    &lt;VulnDiscussion&gt;The DOD standard for authentication is DOD-approved PKI certificates. Once a PKI certificate has been validated, it must be m...
    Rule Medium Severity
  • SRG-APP-000180-DB-000115

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must uniquely identify and authenticate nonorganizational users (or processes acting on behalf of nonorganizational users).

    &lt;VulnDiscussion&gt;Nonorganizational users include all information system users other than organizational users, which include organizational em...
    Rule Medium Severity
  • SRG-APP-000211-DB-000122

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must separate user functionality (including user interface services) from database management functionality.

    &lt;VulnDiscussion&gt;Information system management functionality includes functions necessary to administer databases, network components, worksta...
    Rule Medium Severity
  • SRG-APP-000231-DB-000154

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must protect the confidentiality and integrity of all information at rest.

    &lt;VulnDiscussion&gt;This control is intended to address the confidentiality and integrity of information at rest in nonmobile devices and covers ...
    Rule High Severity
  • SRG-APP-000295-DB-000305

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must automatically terminate a user session after organization-defined conditions or trigger events requiring session disconnect.

    &lt;VulnDiscussion&gt;This addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that ...
    Rule Medium Severity
  • SRG-APP-000340-DB-000304

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must prevent nonprivileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.

    &lt;VulnDiscussion&gt;Preventing nonprivileged users from executing privileged functions mitigates the risk that unauthorized individuals or proces...
    Rule Medium Severity
  • SRG-APP-000357-DB-000316

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must be able to allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.

    &lt;VulnDiscussion&gt;To ensure sufficient storage capacity for the audit logs, the Azure SQL Database must be able to allocate audit record storag...
    Rule Medium Severity
  • SRG-APP-000359-DB-000319

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75 percent of maximum audit record storage capacity.

    &lt;VulnDiscussion&gt;Auditing for Azure SQL Database tracks database events and writes them to an audit log in the Azure storage account, Log Anal...
    Rule Medium Severity
  • SRG-APP-000381-DB-000361

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must produce audit records of its enforcement of access restrictions associated with changes to the configuration of Azure SQL Database(s).

    &lt;VulnDiscussion&gt;Without auditing the enforcement of access restrictions against changes to configuration, it would be difficult to identify a...
    Rule Medium Severity
  • SRG-APP-000383-DB-000364

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must only use approved firewall settings deemed by the organization to be secure, including denying public network access.

    &lt;VulnDiscussion&gt;Use of nonsecure firewall settings, such as allowing public access, exposes the system to avoidable threats.&lt;/VulnDiscussi...
    Rule Medium Severity
  • SRG-APP-000383-DB-000364

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must maintain the confidentiality and integrity of information during preparation for transmission.

    &lt;VulnDiscussion&gt;Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, including...
    Rule Medium Severity
  • SRG-APP-000442-DB-000379

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must maintain the confidentiality and integrity of information during reception.

    &lt;VulnDiscussion&gt;Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, duri...
    Rule Medium Severity
  • SRG-APP-000492-DB-000332

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules