I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000091-DB-000325
<GroupDescription></GroupDescription>Group -
The Azure SQL Database must be able to generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.
<VulnDiscussion>Under some circumstances, it may be useful to monitor who/what is reading privilege/permission/role information. Therefore, i...Rule Medium Severity -
SRG-APP-000092-DB-000208
<GroupDescription></GroupDescription>Group -
Azure SQL Database must initiate session auditing upon startup.
<VulnDiscussion>Session auditing is for use when a user's activities are under investigation. To ensure capture of all activity during those ...Rule Medium Severity -
SRG-APP-000101-DB-000044
<GroupDescription></GroupDescription>Group -
Azure SQL Database must include additional, more detailed, organization-defined information in the audit records for audit events identified by type, location, or subject.
<VulnDiscussion>Information system auditing capability is critical for accurate forensic analysis. Reconstruction of harmful events or forens...Rule Medium Severity -
SRG-APP-000118-DB-000059
<GroupDescription></GroupDescription>Group -
The audit information produced by Azure SQL Database must be protected from unauthorized read access.
<VulnDiscussion>If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially ma...Rule Medium Severity -
SRG-APP-000119-DB-000060
<GroupDescription></GroupDescription>Group -
The audit information produced by Azure SQL Database must be protected from unauthorized modification.
<VulnDiscussion>If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially ma...Rule Medium Severity -
SRG-APP-000120-DB-000061
<GroupDescription></GroupDescription>Group -
The audit information produced by Azure SQL Database must be protected from unauthorized deletion.
<VulnDiscussion>If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially ma...Rule Medium Severity -
SRG-APP-000141-DB-000090
<GroupDescription></GroupDescription>Group -
Azure SQL Database default demonstration and sample databases, database objects, and applications must be removed.
<VulnDiscussion>Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, pr...Rule Medium Severity -
SRG-APP-000142-DB-000094
<GroupDescription></GroupDescription>Group -
The Azure SQL Database must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
<VulnDiscussion>To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...Rule Medium Severity -
SRG-APP-000148-DB-000103
<GroupDescription></GroupDescription>Group -
Azure SQL Database must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
<VulnDiscussion>To ensure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...Rule Medium Severity -
SRG-APP-000177-DB-000069
<GroupDescription></GroupDescription>Group -
Azure SQL Database must map the PKI-authenticated identity to an associated user account.
<VulnDiscussion>The DOD standard for authentication is DOD-approved PKI certificates. Once a PKI certificate has been validated, it must be m...Rule Medium Severity -
SRG-APP-000180-DB-000115
<GroupDescription></GroupDescription>Group -
Azure SQL Database must uniquely identify and authenticate nonorganizational users (or processes acting on behalf of nonorganizational users).
<VulnDiscussion>Nonorganizational users include all information system users other than organizational users, which include organizational em...Rule Medium Severity -
SRG-APP-000211-DB-000122
<GroupDescription></GroupDescription>Group -
Azure SQL Database must separate user functionality (including user interface services) from database management functionality.
<VulnDiscussion>Information system management functionality includes functions necessary to administer databases, network components, worksta...Rule Medium Severity -
SRG-APP-000231-DB-000154
<GroupDescription></GroupDescription>Group -
Azure SQL Database must protect the confidentiality and integrity of all information at rest.
<VulnDiscussion>This control is intended to address the confidentiality and integrity of information at rest in nonmobile devices and covers ...Rule High Severity -
SRG-APP-000295-DB-000305
<GroupDescription></GroupDescription>Group -
Azure SQL Database must automatically terminate a user session after organization-defined conditions or trigger events requiring session disconnect.
<VulnDiscussion>This addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that ...Rule Medium Severity -
SRG-APP-000340-DB-000304
<GroupDescription></GroupDescription>Group -
Azure SQL Database must prevent nonprivileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
<VulnDiscussion>Preventing nonprivileged users from executing privileged functions mitigates the risk that unauthorized individuals or proces...Rule Medium Severity -
SRG-APP-000356-DB-000314
<GroupDescription></GroupDescription>Group -
Azure SQL Database must utilize centralized management of the content captured in audit records generated by all components of the DBMS.
<VulnDiscussion>Without the ability to centrally manage the content captured in the audit records, identification, troubleshooting, and corre...Rule Medium Severity -
SRG-APP-000357-DB-000316
<GroupDescription></GroupDescription>Group -
Azure SQL Database must be able to allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
<VulnDiscussion>To ensure sufficient storage capacity for the audit logs, the Azure SQL Database must be able to allocate audit record storag...Rule Medium Severity -
SRG-APP-000359-DB-000319
<GroupDescription></GroupDescription>Group -
Azure SQL Database must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75 percent of maximum audit record storage capacity.
<VulnDiscussion>Auditing for Azure SQL Database tracks database events and writes them to an audit log in the Azure storage account, Log Anal...Rule Medium Severity -
SRG-APP-000381-DB-000361
<GroupDescription></GroupDescription>Group -
Azure SQL Database must produce audit records of its enforcement of access restrictions associated with changes to the configuration of Azure SQL Database(s).
<VulnDiscussion>Without auditing the enforcement of access restrictions against changes to configuration, it would be difficult to identify a...Rule Medium Severity -
SRG-APP-000383-DB-000364
<GroupDescription></GroupDescription>Group -
Azure SQL Database must only use approved firewall settings deemed by the organization to be secure, including denying public network access.
<VulnDiscussion>Use of nonsecure firewall settings, such as allowing public access, exposes the system to avoidable threats.</VulnDiscussi...Rule Medium Severity -
SRG-APP-000383-DB-000364
<GroupDescription></GroupDescription>Group -
Azure SQL Database must only use approved firewall settings deemed by the organization to be secure, including denying azure services access to the server.
<VulnDiscussion>Use of nonsecure firewall settings, such as allowing azure services to access the server, exposes the system to avoidable thr...Rule Medium Severity -
SRG-APP-000441-DB-000378
<GroupDescription></GroupDescription>Group -
Azure SQL Database must maintain the confidentiality and integrity of information during preparation for transmission.
<VulnDiscussion>Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, including...Rule Medium Severity -
SRG-APP-000442-DB-000379
<GroupDescription></GroupDescription>Group -
Azure SQL Database must maintain the confidentiality and integrity of information during reception.
<VulnDiscussion>Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, duri...Rule Medium Severity -
SRG-APP-000492-DB-000332
<GroupDescription></GroupDescription>Group -
Azure SQL DB must be able to generate audit records when security objects are accessed.
<VulnDiscussion>Changes to the security configuration must be tracked. This requirement applies to situations where security data is retrie...Rule Medium Severity -
SRG-APP-000492-DB-000333
<GroupDescription></GroupDescription>Group -
Azure SQL DB must generate audit records when unsuccessful attempts to access security objects occur.
<VulnDiscussion>Changes to the security configuration must be tracked. This requirement applies to situations where security data is retrie...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.