Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000120-DB-000061

    <GroupDescription></GroupDescription>
    Group
  • The audit information produced by Azure SQL Database must be protected from unauthorized deletion.

    &lt;VulnDiscussion&gt;If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially ma...
    Rule Medium Severity
  • SRG-APP-000141-DB-000090

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database default demonstration and sample databases, database objects, and applications must be removed.

    &lt;VulnDiscussion&gt;Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, pr...
    Rule Medium Severity
  • SRG-APP-000142-DB-000094

    <GroupDescription></GroupDescription>
    Group
  • The Azure SQL Database must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

    &lt;VulnDiscussion&gt;To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...
    Rule Medium Severity
  • SRG-APP-000148-DB-000103

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).

    &lt;VulnDiscussion&gt;To ensure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...
    Rule Medium Severity
  • SRG-APP-000177-DB-000069

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must map the PKI-authenticated identity to an associated user account.

    &lt;VulnDiscussion&gt;The DOD standard for authentication is DOD-approved PKI certificates. Once a PKI certificate has been validated, it must be m...
    Rule Medium Severity
  • SRG-APP-000180-DB-000115

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must uniquely identify and authenticate nonorganizational users (or processes acting on behalf of nonorganizational users).

    &lt;VulnDiscussion&gt;Nonorganizational users include all information system users other than organizational users, which include organizational em...
    Rule Medium Severity
  • SRG-APP-000211-DB-000122

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must separate user functionality (including user interface services) from database management functionality.

    &lt;VulnDiscussion&gt;Information system management functionality includes functions necessary to administer databases, network components, worksta...
    Rule Medium Severity
  • SRG-APP-000231-DB-000154

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must protect the confidentiality and integrity of all information at rest.

    &lt;VulnDiscussion&gt;This control is intended to address the confidentiality and integrity of information at rest in nonmobile devices and covers ...
    Rule High Severity
  • SRG-APP-000295-DB-000305

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must automatically terminate a user session after organization-defined conditions or trigger events requiring session disconnect.

    &lt;VulnDiscussion&gt;This addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that ...
    Rule Medium Severity
  • SRG-APP-000340-DB-000304

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must prevent nonprivileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.

    &lt;VulnDiscussion&gt;Preventing nonprivileged users from executing privileged functions mitigates the risk that unauthorized individuals or proces...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules