Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000356-DB-000314

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must utilize centralized management of the content captured in audit records generated by all components of the DBMS.

    &lt;VulnDiscussion&gt;Without the ability to centrally manage the content captured in the audit records, identification, troubleshooting, and corre...
    Rule Medium Severity
  • SRG-APP-000357-DB-000316

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must be able to allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.

    &lt;VulnDiscussion&gt;To ensure sufficient storage capacity for the audit logs, the Azure SQL Database must be able to allocate audit record storag...
    Rule Medium Severity
  • SRG-APP-000359-DB-000319

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75 percent of maximum audit record storage capacity.

    &lt;VulnDiscussion&gt;Auditing for Azure SQL Database tracks database events and writes them to an audit log in the Azure storage account, Log Anal...
    Rule Medium Severity
  • SRG-APP-000381-DB-000361

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must produce audit records of its enforcement of access restrictions associated with changes to the configuration of Azure SQL Database(s).

    &lt;VulnDiscussion&gt;Without auditing the enforcement of access restrictions against changes to configuration, it would be difficult to identify a...
    Rule Medium Severity
  • SRG-APP-000383-DB-000364

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must only use approved firewall settings deemed by the organization to be secure, including denying public network access.

    &lt;VulnDiscussion&gt;Use of nonsecure firewall settings, such as allowing public access, exposes the system to avoidable threats.&lt;/VulnDiscussi...
    Rule Medium Severity
  • SRG-APP-000383-DB-000364

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must only use approved firewall settings deemed by the organization to be secure, including denying azure services access to the server.

    &lt;VulnDiscussion&gt;Use of nonsecure firewall settings, such as allowing azure services to access the server, exposes the system to avoidable thr...
    Rule Medium Severity
  • SRG-APP-000441-DB-000378

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must maintain the confidentiality and integrity of information during preparation for transmission.

    &lt;VulnDiscussion&gt;Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, including...
    Rule Medium Severity
  • SRG-APP-000442-DB-000379

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must maintain the confidentiality and integrity of information during reception.

    &lt;VulnDiscussion&gt;Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, duri...
    Rule Medium Severity
  • SRG-APP-000492-DB-000332

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL DB must be able to generate audit records when security objects are accessed.

    &lt;VulnDiscussion&gt;Changes to the security configuration must be tracked. This requirement applies to situations where security data is retrie...
    Rule Medium Severity
  • SRG-APP-000492-DB-000333

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL DB must generate audit records when unsuccessful attempts to access security objects occur.

    &lt;VulnDiscussion&gt;Changes to the security configuration must be tracked. This requirement applies to situations where security data is retrie...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules