Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000314-DB-000310

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must associate organization-defined types of security labels having organization-defined security label values with information in transmission.

    &lt;VulnDiscussion&gt;Without the association of security labels to information, there is no basis for SQL Server to make security-related access-c...
    Rule Medium Severity
  • SRG-APP-000328-DB-000301

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.

    &lt;VulnDiscussion&gt;Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have di...
    Rule Low Severity
  • SRG-APP-000342-DB-000302

    <GroupDescription></GroupDescription>
    Group
  • Execution of stored procedures and functions that utilize execute as must be restricted to necessary cases only.

    &lt;VulnDiscussion&gt;In certain situations, to provide required functionality, a DBMS needs to execute internal logic (stored procedures, function...
    Rule Medium Severity
  • SRG-APP-000378-DB-000365

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.

    &lt;VulnDiscussion&gt;Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malici...
    Rule Medium Severity
  • SRG-APP-000380-DB-000360

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must enforce access restrictions associated with changes to the configuration of the database(s).

    &lt;VulnDiscussion&gt;Failure to provide logical access restrictions associated with changes to configuration may have significant effects on the o...
    Rule Medium Severity
  • SRG-APP-000428-DB-000386

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest (to include, at a minimum, PII and classified information) on organization-defined information system components.

    &lt;VulnDiscussion&gt;DBMSs handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized disclos...
    Rule High Severity
  • SRG-APP-000429-DB-000387

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must implement cryptographic mechanisms preventing the unauthorized disclosure of organization-defined information at rest on organization-defined information system components.

    &lt;VulnDiscussion&gt;SQL Server’s handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized ...
    Rule High Severity
  • SRG-APP-000416-DB-000380

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must use NSA-approved cryptography to protect classified information in accordance with the data owners requirements.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The applicatio...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules