Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000231-DB-000154

    <GroupDescription></GroupDescription>
    Group
  • The Service Master Key must be backed up, stored offline and off-site.

    &lt;VulnDiscussion&gt;Backup and recovery of the Service Master Key may be critical to the complete recovery of the database. Not having this key c...
    Rule Medium Severity
  • SRG-APP-000023-DB-000001

    <GroupDescription></GroupDescription>
    Group
  • SQL Server authentication and identity management must be integrated with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.

    &lt;VulnDiscussion&gt;Enterprise environments make account management for applications and databases challenging and complex. A manual process for ...
    Rule Medium Severity
  • SRG-APP-000091-DB-000325

    <GroupDescription></GroupDescription>
    Group
  • Where SQL Server Audit is in use, SQL Server must generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.

    &lt;VulnDiscussion&gt;Under some circumstances, it may be useful to monitor who/what is reading privilege/permission/role information. Therefore, i...
    Rule Medium Severity
  • SRG-APP-000109-DB-000321

    <GroupDescription></GroupDescription>
    Group
  • Where availability is paramount, the SQL Server must continue processing (preferably overwriting existing records, oldest first), in the event of lack of space for more Audit/Trace log records; and must keep processing after any failure of an Audit/Trace.

    &lt;VulnDiscussion&gt;It is critical that when SQL Server is at risk of failing to process audit logs as required, it take action to mitigate the f...
    Rule High Severity
  • SRG-APP-000133-DB-000362

    <GroupDescription></GroupDescription>
    Group
  • The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to SQL Server, etc.) must be restricted to authorized users.

    &lt;VulnDiscussion&gt;If SQL Server were to allow any user to make changes to database structure or logic, then those changes might be implemented ...
    Rule Medium Severity
  • SRG-APP-000179-DB-000114

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.

    &lt;VulnDiscussion&gt;Use of weak or not validated cryptographic algorithms undermines the purposes of utilizing encryption and digital signatures ...
    Rule High Severity
  • SRG-APP-000243-DB-000374

    <GroupDescription></GroupDescription>
    Group
  • Access to database files must be limited to relevant processes and to authorized, administrative users.

    &lt;VulnDiscussion&gt;Applications, including DBMSs, must prevent unauthorized and unintended information transfer via shared system resources. Per...
    Rule Medium Severity
  • SRG-APP-000295-DB-000305

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must automatically terminate a user session after organization-defined conditions or trigger events requiring session disconnect.

    &lt;VulnDiscussion&gt;This addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that ...
    Rule Medium Severity
  • SRG-APP-000340-DB-000304

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must prevent non-privileged users from executing privileged functionality, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.

    &lt;VulnDiscussion&gt;Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or proce...
    Rule Medium Severity
  • SRG-APP-000342-DB-000302

    <GroupDescription></GroupDescription>
    Group
  • Execution of software modules (to include stored procedures, functions, and triggers) with elevated privileges must be restricted to necessary cases only.

    &lt;VulnDiscussion&gt;In certain situations, to provide required functionality, a DBMS needs to execute internal logic (stored procedures, function...
    Rule Medium Severity
  • SRG-APP-000356-DB-000314

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must utilize centralized management of the content captured in audit records generated by all components of the DBMS.

    &lt;VulnDiscussion&gt;Without the ability to centrally manage the content captured in the audit records, identification, troubleshooting, and corre...
    Rule Medium Severity
  • SRG-APP-000357-DB-000316

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.

    &lt;VulnDiscussion&gt;In order to ensure sufficient storage capacity for the audit logs, SQL Server must be able to allocate audit record storage c...
    Rule Medium Severity
  • SRG-APP-000359-DB-000319

    <GroupDescription></GroupDescription>
    Group
  • SQL Server, the operating system, or the storage system must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75% of maximum audit record storage capacity.

    &lt;VulnDiscussion&gt;Organizations are required to use a central log management system, so, under normal conditions, the audit space allocated to ...
    Rule Medium Severity
  • SRG-APP-000360-DB-000320

    <GroupDescription></GroupDescription>
    Group
  • SQL Server or software monitoring SQL Server must provide an immediate real-time alert to appropriate support staff of all audit log failures.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-APP-000374-DB-000322

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must produce time stamps that can be mapped to Coordinated Universal Time (UTC, formerly GMT).

    &lt;VulnDiscussion&gt;If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...
    Rule Medium Severity
  • SRG-APP-000378-DB-000365

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.

    &lt;VulnDiscussion&gt;Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malici...
    Rule Medium Severity
  • SRG-APP-000380-DB-000360

    <GroupDescription></GroupDescription>
    Group
  • SQL Server and Windows must enforce access restrictions associated with changes to the configuration of the SQL Server instance or database(s).

    &lt;VulnDiscussion&gt;Failure to provide logical access restrictions associated with changes to configuration may have significant effects on the o...
    Rule Medium Severity
  • SRG-APP-000381-DB-000361

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must produce Trace or Audit records of its enforcement of access restrictions associated with changes to the configuration of the DBMS or database(s).

    &lt;VulnDiscussion&gt;Without auditing the enforcement of access restrictions against changes to configuration, it would be difficult to identify a...
    Rule Medium Severity
  • SRG-APP-000383-DB-000364

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must disable communication protocols not required for operation.

    &lt;VulnDiscussion&gt;Having unnecessary protocols enabled exposes the system to avoidable threats. In a typical installation, only TCP/IP will be...
    Rule Medium Severity
  • SRG-APP-000429-DB-000387

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must implement and/or support cryptographic mechanisms preventing the unauthorized disclosure of organization-defined information at rest on organization-defined information system components.

    &lt;VulnDiscussion&gt;DBMSs handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized disclos...
    Rule Medium Severity
  • SRG-APP-000441-DB-000378

    <GroupDescription></GroupDescription>
    Group
  • The confidentiality and integrity of information managed by SQL Server must be maintained during preparation for transmission.

    &lt;VulnDiscussion&gt;Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, including...
    Rule Medium Severity
  • SRG-APP-000442-DB-000379

    <GroupDescription></GroupDescription>
    Group
  • The confidentiality and integrity of information managed by SQL Server must be maintained during reception.

    &lt;VulnDiscussion&gt;Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, duri...
    Rule Medium Severity
  • SRG-APP-000456-DB-000390

    <GroupDescription></GroupDescription>
    Group
  • Security-relevant software updates to SQL Server must be installed within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).

    &lt;VulnDiscussion&gt;Security flaws with software applications, including database management systems, are discovered daily. Vendors are constantl...
    Rule Medium Severity
  • SRG-APP-000456-DB-000390

    <GroupDescription></GroupDescription>
    Group
  • Software updates to SQL Server must be tested before being applied to production systems.

    &lt;VulnDiscussion&gt;While it is important to apply SQL Server updates in a timely manner, it is also incumbent upon the database administrator an...
    Rule Medium Severity
  • SRG-APP-000492-DB-000332

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must produce Trace or Audit records when security objects are accessed.

    &lt;VulnDiscussion&gt;Changes to the security configuration must be tracked. This requirement applies to situations where security data is retrie...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules