Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000091-DB-000066

    Group
  • The Azure SQL Database must be able to generate audit records when privileges/permissions are retrieved.

    Under some circumstances, it may be useful to monitor who/what is reading privilege/permission/role information. Therefore, it must be possible to configure auditing to do this. DBMSs typically mak...
    Rule Medium Severity
  • SRG-APP-000091-DB-000325

    Group
  • The Azure SQL Database must be able to generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.

    Under some circumstances, it may be useful to monitor who/what is reading privilege/permission/role information. Therefore, it must be possible to configure auditing to do this. DBMSs typically mak...
    Rule Medium Severity
  • SRG-APP-000092-DB-000208

    Group
  • Azure SQL Database must initiate session auditing upon startup.

    Session auditing is for use when a user's activities are under investigation. To ensure capture of all activity during those periods when session auditing is in use, it needs to be in operation for...
    Rule Medium Severity
  • SRG-APP-000101-DB-000044

    Group
  • Azure SQL Database must include additional, more detailed, organization-defined information in the audit records for audit events identified by type, location, or subject.

    Information system auditing capability is critical for accurate forensic analysis. Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough infor...
    Rule Medium Severity
  • SRG-APP-000118-DB-000059

    Group
  • The audit information produced by Azure SQL Database must be protected from unauthorized read access.

    If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve. In ...
    Rule Medium Severity
  • SRG-APP-000119-DB-000060

    Group
  • The audit information produced by Azure SQL Database must be protected from unauthorized modification.

    If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve. In ...
    Rule Medium Severity
  • SRG-APP-000120-DB-000061

    Group
  • The audit information produced by Azure SQL Database must be protected from unauthorized deletion.

    If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve. To ensure the veracit...
    Rule Medium Severity
  • SRG-APP-000141-DB-000090

    Group
  • Azure SQL Database default demonstration and sample databases, database objects, and applications must be removed.

    Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, provided by default, may not be necessary to support essential organizatio...
    Rule Medium Severity
  • SRG-APP-000142-DB-000094

    Group
  • The Azure SQL Database must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

    To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable or restr...
    Rule Medium Severity
  • SRG-APP-000148-DB-000103

    Group
  • Azure SQL Database must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).

    To ensure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational use...
    Rule Medium Severity
  • SRG-APP-000177-DB-000069

    Group
  • Azure SQL Database must map the PKI-authenticated identity to an associated user account.

    The DOD standard for authentication is DOD-approved PKI certificates. Once a PKI certificate has been validated, it must be mapped to an Azure SQL Database user account for the authenticated identi...
    Rule Medium Severity
  • SRG-APP-000180-DB-000115

    Group
  • Azure SQL Database must uniquely identify and authenticate nonorganizational users (or processes acting on behalf of nonorganizational users).

    Nonorganizational users include all information system users other than organizational users, which include organizational employees or individuals the organization deems to have equivalent status ...
    Rule Medium Severity
  • SRG-APP-000211-DB-000122

    Group
  • Azure SQL Database must separate user functionality (including user interface services) from database management functionality.

    Information system management functionality includes functions necessary to administer databases, network components, workstations, or servers and typically requires privileged user access. The s...
    Rule Medium Severity
  • SRG-APP-000231-DB-000154

    Group
  • Azure SQL Database must protect the confidentiality and integrity of all information at rest.

    This control is intended to address the confidentiality and integrity of information at rest in nonmobile devices and covers user information and system information. Information at rest refers to t...
    Rule High Severity
  • SRG-APP-000295-DB-000305

    Group
  • Azure SQL Database must automatically terminate a user session after organization-defined conditions or trigger events requiring session disconnect.

    This addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that are associated with communications sessions (i.e., network disconnect). ...
    Rule Medium Severity
  • SRG-APP-000340-DB-000304

    Group
  • Azure SQL Database must prevent nonprivileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.

    Preventing nonprivileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. System d...
    Rule Medium Severity
  • SRG-APP-000357-DB-000316

    Group
  • Azure SQL Database must be able to allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.

    To ensure sufficient storage capacity for the audit logs, the Azure SQL Database must be able to allocate audit record storage capacity. Although another requirement (SRG-APP-000515-DB-000318) mand...
    Rule Medium Severity
  • SRG-APP-000359-DB-000319

    Group
  • Azure SQL Database must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75 percent of maximum audit record storage capacity.

    Auditing for Azure SQL Database tracks database events and writes them to an audit log in the Azure storage account, Log Analytics workspace, or Event Hubs. Under normal conditions, the audit spac...
    Rule Medium Severity
  • SRG-APP-000381-DB-000361

    Group
  • Azure SQL Database must produce audit records of its enforcement of access restrictions associated with changes to the configuration of Azure SQL Database(s).

    Without auditing the enforcement of access restrictions against changes to configuration, it would be difficult to identify attempted attacks and an audit trail would not be available for forensic ...
    Rule Medium Severity
  • SRG-APP-000383-DB-000364

    Group
  • Azure SQL Database must only use approved firewall settings deemed by the organization to be secure, including denying public network access.

    Use of nonsecure firewall settings, such as allowing public access, exposes the system to avoidable threats.
    Rule Medium Severity
  • SRG-APP-000383-DB-000364

    Group
  • Azure SQL Database must only use approved firewall settings deemed by the organization to be secure, including denying azure services access to the server.

    Use of nonsecure firewall settings, such as allowing azure services to access the server, exposes the system to avoidable threats.
    Rule Medium Severity
  • SRG-APP-000441-DB-000378

    Group
  • Azure SQL Database must maintain the confidentiality and integrity of information during preparation for transmission.

    Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, including, for example, during aggregation, at protocol transformation points, an...
    Rule Medium Severity
  • SRG-APP-000442-DB-000379

    Group
  • Azure SQL Database must maintain the confidentiality and integrity of information during reception.

    Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, during aggregation, at protocol transformation points, and during packing/un...
    Rule Medium Severity
  • SRG-APP-000492-DB-000332

    Group
  • Azure SQL DB must be able to generate audit records when security objects are accessed.

    Changes to the security configuration must be tracked. This requirement applies to situations where security data is retrieved or modified via data manipulation operations, as opposed to via spec...
    Rule Medium Severity
  • SRG-APP-000492-DB-000333

    Group
  • Azure SQL DB must generate audit records when unsuccessful attempts to access security objects occur.

    Changes to the security configuration must be tracked. This requirement applies to situations where security data is retrieved or modified via data manipulation operations, as opposed to via spec...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules