Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000141-DB-000093

    <GroupDescription></GroupDescription>
    Group
  • Access to linked servers must be disabled or restricted, unless specifically required and approved.

    &lt;VulnDiscussion&gt;Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, pr...
    Rule Medium Severity
  • SRG-APP-000142-DB-000094

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must be configured to prohibit or restrict the use of organization-defined protocols as defined in the PPSM CAL and vulnerability assessments.

    &lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule Medium Severity
  • SRG-APP-000142-DB-000094

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must be configured to prohibit or restrict the use of organization-defined ports, as defined in the PPSM CAL and vulnerability assessments.

    &lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule Medium Severity
  • SRG-APP-000148-DB-000103

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).

    &lt;VulnDiscussion&gt;To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...
    Rule Medium Severity
  • SRG-APP-000164-DB-000401

    <GroupDescription></GroupDescription>
    Group
  • If DBMS authentication using passwords is employed, SQL Server must enforce the DOD standards for password complexity and lifetime.

    &lt;VulnDiscussion&gt;Windows Authentication is the default authentication mode and is much more secure than SQL Server Authentication. Windows Aut...
    Rule High Severity
  • SRG-APP-000164-DB-000401

    <GroupDescription></GroupDescription>
    Group
  • Contained databases must use Windows principals.

    &lt;VulnDiscussion&gt;OS/enterprise authentication and identification must be used (SRG-APP-000023-DB-000001). Native DBMS authentication may be us...
    Rule Medium Severity
  • SRG-APP-000172-DB-000075

    <GroupDescription></GroupDescription>
    Group
  • If passwords are used for authentication, SQL Server must transmit only encrypted representations of passwords.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. Authentication based on User ID and Password may be ...
    Rule High Severity
  • SRG-APP-000172-DB-000075

    <GroupDescription></GroupDescription>
    Group
  • Confidentiality of information during transmission is controlled through the use of an approved TLS version.

    &lt;VulnDiscussion&gt;Transport Layer Security (TLS) encryption is a required security setting as a number of known vulnerabilities have been repor...
    Rule High Severity
  • SRG-APP-000176-DB-000068

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must enforce authorized access to all PKI private keys stored/utilized by SQL Server.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. PKI certificate-based authentication is performed by re...
    Rule High Severity
  • SRG-APP-000179-DB-000114

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.

    &lt;VulnDiscussion&gt;Use of weak or not validated cryptographic algorithms undermines the purposes of utilizing encryption and digital signatures ...
    Rule High Severity
  • SRG-APP-000180-DB-000115

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).

    &lt;VulnDiscussion&gt;Non-organizational users include all information system users other than organizational users, which include organizational e...
    Rule Medium Severity
  • SRG-APP-000224-DB-000384

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.

    &lt;VulnDiscussion&gt;One class of man-in-the-middle, or session hijacking, attack involves the adversary guessing at valid session identifiers bas...
    Rule Medium Severity
  • SRG-APP-000231-DB-000154

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must protect the confidentiality and integrity of all information at rest.

    &lt;VulnDiscussion&gt;This control is intended to address the confidentiality and integrity of information at rest in non-mobile devices and covers...
    Rule High Severity
  • SRG-APP-000231-DB-000154

    <GroupDescription></GroupDescription>
    Group
  • The Service Master Key must be backed up and stored in a secure location that is not on the SQL Server.

    &lt;VulnDiscussion&gt;Backup and recovery of the Service Master Key may be critical to the complete recovery of the database. Creating this backup ...
    Rule Medium Severity
  • SRG-APP-000231-DB-000154

    <GroupDescription></GroupDescription>
    Group
  • The Master Key must be backed up and stored in a secure location that is not on the SQL Server.

    &lt;VulnDiscussion&gt;Backup and recovery of the Master Key may be critical to the complete recovery of the database. Not having this key can lead ...
    Rule Medium Severity
  • SRG-APP-000243-DB-000373

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must prevent unauthorized and unintended information transfer via shared system resources.

    &lt;VulnDiscussion&gt;The purpose of this control is to prevent information, including encrypted representations of information, produced by the ac...
    Rule Medium Severity
  • SRG-APP-000243-DB-000373

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must prevent unauthorized and unintended information transfer via Instant File Initialization (IFI).

    &lt;VulnDiscussion&gt;The purpose of this control is to prevent information, including encrypted representations of information, produced by the ac...
    Rule Medium Severity
  • SRG-APP-000243-DB-000374

    <GroupDescription></GroupDescription>
    Group
  • Access to database files must be limited to relevant processes and to authorized, administrative users.

    &lt;VulnDiscussion&gt;SQL Server must prevent unauthorized and unintended information transfer via shared system resources. Permitting only SQL Ser...
    Rule Medium Severity
  • SRG-APP-000267-DB-000163

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must reveal detailed error messages only to documented and approved individuals or roles.

    &lt;VulnDiscussion&gt;If SQL Server provides too much information in error logs and administrative messages to the screen, this could lead to compr...
    Rule Medium Severity
  • SRG-APP-000340-DB-000304

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must prevent non-privileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.

    &lt;VulnDiscussion&gt;Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or proce...
    Rule Medium Severity
  • SRG-APP-000342-DB-000302

    <GroupDescription></GroupDescription>
    Group
  • Use of credentials and proxies must be restricted to necessary cases only.

    &lt;VulnDiscussion&gt;In certain situations, to provide required functionality, a DBMS needs to execute internal logic (stored procedures, function...
    Rule Medium Severity
  • SRG-APP-000357-DB-000316

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.

    &lt;VulnDiscussion&gt;In order to ensure sufficient storage capacity for the audit logs, SQL Server must be able to allocate audit record storage c...
    Rule Medium Severity
  • SRG-APP-000359-DB-000319

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75% of maximum audit record storage capacity.

    &lt;VulnDiscussion&gt;Organizations are required to use a central log management system, so, under normal conditions, the audit space allocated to ...
    Rule Medium Severity
  • SRG-APP-000360-DB-000320

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must provide an immediate real-time alert to appropriate support staff of all audit log failures.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-APP-000374-DB-000322

    <GroupDescription></GroupDescription>
    Group
  • SQL Server must record time stamps in audit records and application data that can be mapped to Coordinated Universal Time (UTC, formerly GMT).

    &lt;VulnDiscussion&gt;If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules