Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000428-DB-000386

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest (to include, at a minimum, PII and classified information) on organization-defined information system components.

    &lt;VulnDiscussion&gt;Azure SQL Databases handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauth...
    Rule High Severity
  • SRG-APP-000429-DB-000387

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must implement cryptographic mechanisms preventing the unauthorized disclosure of organization-defined information at rest on organization-defined information system components.

    &lt;VulnDiscussion&gt;Azure SQL Databases handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauth...
    Rule High Severity
  • SRG-APP-000447-DB-000393

    <GroupDescription></GroupDescription>
    Group
  • When invalid inputs are received, the Azure SQL Database must behave in a predictable and documented manner that reflects organizational and system objectives.

    &lt;VulnDiscussion&gt;A common vulnerability is unplanned behavior when invalid inputs are received. This requirement guards against adverse or uni...
    Rule Medium Severity
  • SRG-APP-000089-DB-000064

    <GroupDescription></GroupDescription>
    Group
  • The Azure SQL Database must be configured to generate audit records for DOD-defined auditable events within all DBMS/database components.

    &lt;VulnDiscussion&gt;Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events r...
    Rule Medium Severity
  • SRG-APP-000090-DB-000065

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.

    &lt;VulnDiscussion&gt;Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...
    Rule Medium Severity
  • SRG-APP-000091-DB-000066

    <GroupDescription></GroupDescription>
    Group
  • The Azure SQL Database must be able to generate audit records when privileges/permissions are retrieved.

    &lt;VulnDiscussion&gt;Under some circumstances, it may be useful to monitor who/what is reading privilege/permission/role information. Therefore, i...
    Rule Medium Severity
  • SRG-APP-000091-DB-000325

    <GroupDescription></GroupDescription>
    Group
  • The Azure SQL Database must be able to generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.

    &lt;VulnDiscussion&gt;Under some circumstances, it may be useful to monitor who/what is reading privilege/permission/role information. Therefore, i...
    Rule Medium Severity
  • SRG-APP-000092-DB-000208

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must initiate session auditing upon startup.

    &lt;VulnDiscussion&gt;Session auditing is for use when a user's activities are under investigation. To ensure capture of all activity during those ...
    Rule Medium Severity
  • SRG-APP-000101-DB-000044

    <GroupDescription></GroupDescription>
    Group
  • Azure SQL Database must include additional, more detailed, organization-defined information in the audit records for audit events identified by type, location, or subject.

    &lt;VulnDiscussion&gt;Information system auditing capability is critical for accurate forensic analysis. Reconstruction of harmful events or forens...
    Rule Medium Severity
  • SRG-APP-000118-DB-000059

    <GroupDescription></GroupDescription>
    Group
  • The audit information produced by Azure SQL Database must be protected from unauthorized read access.

    &lt;VulnDiscussion&gt;If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially ma...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules