Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000033-DB-000084

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must enforce approved authorizations for logical access to information and database-level system resources in accordance with applicable access control policies.

    &lt;VulnDiscussion&gt;Authentication with a DoD-approved PKI certificate does not necessarily imply authorization to access the database and all it...
    Rule Medium Severity
  • SRG-APP-000089-DB-000064

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must generate Trace or Audit records for organization-defined auditable events.

    &lt;VulnDiscussion&gt;Audit records can be generated from various components within the information system (e.g., network interface, hard disk, mod...
    Rule Medium Severity
  • SRG-APP-000090-DB-000065

    <GroupDescription></GroupDescription>
    Group
  • Where SQL Server Audit is in use at the database level, SQL Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited at the database level.

    &lt;VulnDiscussion&gt;Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...
    Rule Medium Severity
  • SRG-APP-000133-DB-000179

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must be monitored to discover unauthorized changes to functions.

    &lt;VulnDiscussion&gt;When dealing with change control issues, it should be noted, any changes to the hardware, software, and/or firmware component...
    Rule Medium Severity
  • SRG-APP-000133-DB-000179

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must be monitored to discover unauthorized changes to triggers.

    &lt;VulnDiscussion&gt;When dealing with change control issues, it should be noted, any changes to the hardware, software, and/or firmware component...
    Rule Medium Severity
  • SRG-APP-000133-DB-000179

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must be monitored to discover unauthorized changes to stored procedures.

    &lt;VulnDiscussion&gt;When dealing with change control issues, it should be noted, any changes to the hardware, software, and/or firmware component...
    Rule Medium Severity
  • SRG-APP-000133-DB-000200

    <GroupDescription></GroupDescription>
    Group
  • Database objects (including but not limited to tables, indexes, storage, stored procedures, functions, triggers, links to software external to SQL Server, etc.) must be owned by database/DBMS principals authorized for ownership.

    &lt;VulnDiscussion&gt;Within the database, object ownership implies full privileges to the owned object, including the privilege to assign access t...
    Rule Medium Severity
  • SRG-APP-000133-DB-000200

    <GroupDescription></GroupDescription>
    Group
  • In a database owned by a login not having administrative privileges at the instance level, the database property TRUSTWORTHY must be OFF unless required and authorized.

    &lt;VulnDiscussion&gt;SQL Server's fixed (built-in) server roles, especially [sysadmin], have powerful capabilities that could cause great harm if ...
    Rule Medium Severity
  • SRG-APP-000133-DB-000200

    <GroupDescription></GroupDescription>
    Group
  • In a database owned by [sa], or by any other login having administrative privileges at the instance level, the database property TRUSTWORTHY must be OFF.

    &lt;VulnDiscussion&gt;SQL Server's fixed (built-in) server roles, especially [sysadmin], have powerful capabilities that could cause great harm if ...
    Rule Medium Severity
  • SRG-APP-000226-DB-000147

    <GroupDescription></GroupDescription>
    Group
  • In the event of a system failure, SQL Server must preserve any information necessary to return to operations with least disruption to mission processes.

    &lt;VulnDiscussion&gt;Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Th...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules