Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000492-DB-000333

    Group
  • SQL Server must produce Trace or Audit records when unsuccessful attempts to access security objects occur.

    Changes to the security configuration must be tracked. To aid in diagnosis, it is necessary to keep track of failed attempts in addition to the successful ones. This requirement applies to situat...
    Rule Medium Severity
  • SRG-APP-000495-DB-000326

    Group
  • SQL Server must generate Trace or Audit records when privileges/permissions are added.

    Changes in the permissions, privileges, and roles granted to users and roles must be tracked. Without an audit trail, unauthorized elevation or restriction of privileges could go undetected. Elevat...
    Rule Medium Severity
  • SRG-APP-000495-DB-000327

    Group
  • SQL Server must generate Trace or Audit records when unsuccessful attempts to add privileges/permissions occur.

    Failed attempts to change the permissions, privileges, and roles granted to users and roles must be tracked. Without an audit trail, unauthorized attempts to elevate or restrict privileges could go...
    Rule Medium Severity
  • SRG-APP-000499-DB-000330

    Group
  • SQL Server must generate Trace or Audit records when privileges/permissions are deleted.

    Changes in the permissions, privileges, and roles granted to users and roles must be tracked. Without an audit trail, unauthorized elevation or restriction of privileges could go undetected. Elevat...
    Rule Medium Severity
  • SRG-APP-000499-DB-000331

    Group
  • SQL Server must generate Trace or Audit records when unsuccessful attempts to delete privileges/permissions occur.

    Changes in the permissions, privileges, and roles granted to users and roles must be tracked. Without an audit trail, unauthorized elevation or restriction of privileges could go undetected. Elevat...
    Rule Medium Severity
  • SRG-APP-000503-DB-000350

    Group
  • SQL Server must generate Trace or Audit records when successful logons or connections occur.

    For completeness of forensic analysis, it is necessary to track who/what (a user or other principal) logs on to SQL Server. Use of SQL Server Audit is recommended. All features of SQL Server Audit...
    Rule Medium Severity
  • SRG-APP-000503-DB-000351

    Group
  • SQL Server must generate Trace or Audit records when unsuccessful logons or connection attempts occur.

    For completeness of forensic analysis, it is necessary to track failed attempts to log on to SQL Server. While positive identification may not be possible in a case of failed authentication, as muc...
    Rule Medium Severity
  • SRG-APP-000504-DB-000354

    Group
  • SQL Server must generate Trace or Audit records for all privileged activities or other system-level access.

    Without tracking privileged activity, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. System documentation...
    Rule Medium Severity
  • SRG-APP-000504-DB-000355

    Group
  • SQL Server must generate Trace or Audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.

    Without tracking privileged activity, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. To aid in diagnosis,...
    Rule Medium Severity
  • SRG-APP-000505-DB-000352

    Group
  • SQL Server must generate Trace or Audit records when logoffs or disconnections occur.

    For completeness of forensic analysis, it is necessary to track who/what (a user or other principal) logs on to and off from SQL Server. Use of SQL Server Audit is recommended. All features of SQ...
    Rule Medium Severity
  • SRG-APP-000506-DB-000353

    Group
  • SQL Server must generate Trace or Audit records when concurrent logons/connections by the same user from different workstations occur.

    For completeness of forensic analysis, it is necessary to track who logs on to SQL Server. Concurrent connections by the same user from multiple workstations may be valid use of the system; or suc...
    Rule Medium Severity
  • SRG-APP-000515-DB-000318

    Group
  • SQL Server must off-load audit data to a separate log management facility; this must be continuous and in near real time for systems with a network connection to the storage facility and weekly or more often for stand-alone systems.

    Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity. T...
    Rule Medium Severity
  • SRG-APP-000164-DB-000401

    Group
  • If SQL Server authentication, using passwords, is employed, SQL Server must enforce the DoD standards for password complexity.

    Windows domain/enterprise authentication and identification must be used (SQL4-00-030300). Native SQL Server authentication may be used only when circumstances make it unavoidable; and must be doc...
    Rule Medium Severity
  • SRG-APP-000164-DB-000401

    Group
  • If SQL Server authentication, using passwords, is employed, SQL Server must enforce the DoD standards for password lifetime.

    Windows domain/enterprise authentication and identification must be used (SQL4-00-030300). Native SQL Server authentication may be used only when circumstances make it unavoidable; and must be doc...
    Rule Medium Severity
  • SRG-APP-000178-DB-000083

    Group
  • Applications must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.

    To prevent the compromise of authentication information, such as passwords and PINs, during the authentication process, the feedback from the information system must not provide any information tha...
    Rule High Severity
  • SRG-APP-000178-DB-000083

    Group
  • When using command-line tools such as SQLCMD in a mixed-mode authentication environment, users must use a logon method that does not expose the password.

    To prevent the compromise of authentication information, such as passwords and PINs, during the authentication process, the feedback from the information system must not provide any information tha...
    Rule High Severity
  • SRG-APP-000516-DB-000363

    Group
  • The SQL Server Browser service must be disabled if its use is not necessary..

    The SQL Server Browser simplifies the administration of SQL Server, particularly when multiple instances of SQL Server coexist on the same computer. It avoids the need to hard-assign port numbers ...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules