Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000164-DB-000401

    <GroupDescription></GroupDescription>
    Group
  • Contained databases must use Windows principals.

    &lt;VulnDiscussion&gt;OS/enterprise authentication and identification must be used (SRG-APP-000023-DB-000001). Native DBMS authentication may be us...
    Rule Medium Severity
  • SRG-APP-000172-DB-000075

    <GroupDescription></GroupDescription>
    Group
  • If passwords are used for authentication, SQL Server must transmit only encrypted representations of passwords.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. Authentication based on User ID and Password may be ...
    Rule High Severity
  • SRG-APP-000172-DB-000075

    <GroupDescription></GroupDescription>
    Group
  • Confidentiality of information during transmission is controlled through the use of an approved TLS version.

    &lt;VulnDiscussion&gt;Transport Layer Security (TLS) encryption is a required security setting as a number of known vulnerabilities have been repor...
    Rule High Severity
  • SRG-APP-000176-DB-000068

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must enforce authorized access to all PKI private keys stored/utilized by SQL Server.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. PKI certificate-based authentication is performed by re...
    Rule High Severity
  • SRG-APP-000179-DB-000114

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.

    &lt;VulnDiscussion&gt;Use of weak or not validated cryptographic algorithms undermines the purposes of utilizing encryption and digital signatures ...
    Rule High Severity
  • SRG-APP-000180-DB-000115

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).

    &lt;VulnDiscussion&gt;Non-organizational users include all information system users other than organizational users, which include organizational e...
    Rule Medium Severity
  • SRG-APP-000224-DB-000384

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.

    &lt;VulnDiscussion&gt;One class of man-in-the-middle, or session hijacking, attack involves the adversary guessing at valid session identifiers bas...
    Rule Medium Severity
  • SRG-APP-000231-DB-000154

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must protect the confidentiality and integrity of all information at rest.

    &lt;VulnDiscussion&gt;This control is intended to address the confidentiality and integrity of information at rest in non-mobile devices and covers...
    Rule High Severity
  • SRG-APP-000231-DB-000154

    <GroupDescription></GroupDescription>
    Group
  • The Service Master Key must be backed up and stored in a secure location that is not on the SQL Server.

    &lt;VulnDiscussion&gt;Backup and recovery of the Service Master Key may be critical to the complete recovery of the database. Creating this backup ...
    Rule Medium Severity
  • SRG-APP-000231-DB-000154

    <GroupDescription></GroupDescription>
    Group
  • The Master Key must be backed up and stored in a secure location that is not on the SQL Server.

    &lt;VulnDiscussion&gt;Backup and recovery of the Master Key may be critical to the complete recovery of the database. Not having this key can lead ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules