Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000141-DB-000093

    <GroupDescription></GroupDescription>
    Group
  • Access to linked servers must be disabled or restricted, unless specifically required and approved.

    &lt;VulnDiscussion&gt;Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, pr...
    Rule Medium Severity
  • SRG-APP-000142-DB-000094

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must be configured to prohibit or restrict the use of organization-defined protocols as defined in the PPSM CAL and vulnerability assessments.

    &lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule Medium Severity
  • SRG-APP-000142-DB-000094

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must be configured to prohibit or restrict the use of organization-defined ports, as defined in the PPSM CAL and vulnerability assessments.

    &lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule Medium Severity
  • SRG-APP-000148-DB-000103

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).

    &lt;VulnDiscussion&gt;To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...
    Rule Medium Severity
  • SRG-APP-000164-DB-000401

    <GroupDescription></GroupDescription>
    Group
  • If DBMS authentication using passwords is employed, SQL Server must enforce the DoD standards for password complexity and lifetime.

    &lt;VulnDiscussion&gt;OS/enterprise authentication and identification must be used (SRG-APP-000023-DB-000001). Native DBMS authentication may be us...
    Rule High Severity
  • SRG-APP-000164-DB-000401

    <GroupDescription></GroupDescription>
    Group
  • Contained databases must use Windows principals.

    &lt;VulnDiscussion&gt;OS/enterprise authentication and identification must be used (SRG-APP-000023-DB-000001). Native DBMS authentication may be u...
    Rule Medium Severity
  • SRG-APP-000172-DB-000075

    <GroupDescription></GroupDescription>
    Group
  • If passwords are used for authentication, SQL Server must transmit only encrypted representations of passwords.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. Authentication based on User ID and Password may be ...
    Rule High Severity
  • SRG-APP-000172-DB-000075

    <GroupDescription></GroupDescription>
    Group
  • Confidentiality of information during transmission is controlled through the use of an approved TLS version.

    &lt;VulnDiscussion&gt;Transport Layer Security (TLS) encryption is a required security setting as a number of known vulnerabilities have been repor...
    Rule High Severity
  • SRG-APP-000176-DB-000068

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must enforce authorized access to all PKI private keys stored/utilized by SQL Server.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. PKI certificate-based authentication is performed by re...
    Rule High Severity
  • SRG-APP-000179-DB-000114

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.

    &lt;VulnDiscussion&gt;Use of weak or not validated cryptographic algorithms undermines the purposes of utilizing encryption and digital signatures ...
    Rule High Severity
  • SRG-APP-000180-DB-000115

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).

    &lt;VulnDiscussion&gt;Non-organizational users include all information system users other than organizational users, which include organizational e...
    Rule Medium Severity
  • SRG-APP-000224-DB-000384

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.

    &lt;VulnDiscussion&gt;One class of man-in-the-middle, or session hijacking, attack involves the adversary guessing at valid session identifiers bas...
    Rule Medium Severity
  • SRG-APP-000231-DB-000154

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must protect the confidentiality and integrity of all information at rest.

    &lt;VulnDiscussion&gt;This control is intended to address the confidentiality and integrity of information at rest in non-mobile devices and covers...
    Rule High Severity
  • SRG-APP-000231-DB-000154

    <GroupDescription></GroupDescription>
    Group
  • The Service Master Key must be backed up, stored offline and off-site.

    &lt;VulnDiscussion&gt;Backup and recovery of the Service Master Key may be critical to the complete recovery of the database. Creating this backup ...
    Rule Medium Severity
  • SRG-APP-000231-DB-000154

    <GroupDescription></GroupDescription>
    Group
  • The Master Key must be backed up, stored offline and off-site.

    &lt;VulnDiscussion&gt;Backup and recovery of the Master Key may be critical to the complete recovery of the database. Not having this key can lead...
    Rule Medium Severity
  • SRG-APP-000243-DB-000373

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must prevent unauthorized and unintended information transfer via shared system resources.

    &lt;VulnDiscussion&gt;The purpose of this control is to prevent information, including encrypted representations of information, produced by the ac...
    Rule Medium Severity
  • SRG-APP-000243-DB-000373

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must prevent unauthorized and unintended information transfer via Instant File Initialization (IFI).

    &lt;VulnDiscussion&gt;The purpose of this control is to prevent information, including encrypted representations of information, produced by the ac...
    Rule Medium Severity
  • SRG-APP-000243-DB-000374

    <GroupDescription></GroupDescription>
    Group
  • Access to database files must be limited to relevant processes and to authorized, administrative users.

    &lt;VulnDiscussion&gt;SQL Server must prevent unauthorized and unintended information transfer via shared system resources. Permitting only SQL Ser...
    Rule Medium Severity
  • SRG-APP-000267-DB-000163

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must reveal detailed error messages only to the ISSO, ISSM, SA, and DBA.

    &lt;VulnDiscussion&gt;If SQL Server provides too much information in error logs and administrative messages to the screen, this could lead to compr...
    Rule Medium Severity
  • SRG-APP-000340-DB-000304

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must prevent non-privileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.

    &lt;VulnDiscussion&gt;Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or proce...
    Rule Medium Severity
  • SRG-APP-000342-DB-000302

    <GroupDescription></GroupDescription>
    Group
  • Use of credentials and proxies must be restricted to necessary cases only.

    &lt;VulnDiscussion&gt;In certain situations, to provide required functionality, a DBMS needs to execute internal logic (stored procedures, function...
    Rule Medium Severity
  • SRG-APP-000356-DB-000314

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must utilize centralized management of the content captured in audit records generated by all components of SQL Server.

    &lt;VulnDiscussion&gt;Without the ability to centrally manage the content captured in the audit records, identification, troubleshooting, and corre...
    Rule Medium Severity
  • SRG-APP-000356-DB-000315

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must provide centralized configuration of the content to be captured in audit records generated by all components of SQL Server.

    &lt;VulnDiscussion&gt;If the configuration of SQL Server's auditing is spread across multiple locations in the database management software, or acr...
    Rule Medium Severity
  • SRG-APP-000357-DB-000316

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.

    &lt;VulnDiscussion&gt;In order to ensure sufficient storage capacity for the audit logs, SQL Server must be able to allocate audit record storage c...
    Rule Medium Severity
  • SRG-APP-000359-DB-000319

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75% of maximum audit record storage capacity.

    &lt;VulnDiscussion&gt;Organizations are required to use a central log management system, so, under normal conditions, the audit space allocated to ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules