UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Application objects should be owned by accounts authorized for ownership.


Overview

Finding ID Version Rule ID IA Controls Severity
V-15607 DG0008-SQLServer9 SV-24068r1_rule ECLP-1 Medium
Description
Database object ownership implies full privileges to the owned object including the privilege to assign access to the owned objects to other subjects. Unmanaged or uncontrolled ownership of objects can lead to unauthorized object grants and alterations.
STIG Date
Microsoft SQL Server 2005 Database Security Technical Implementation Guide 2015-04-03

Details

Check Text ( None )
None
Fix Text (F-17828r1_fix)
Create database accounts dedicated for application object ownership.

To simplify access authorizations, use a single account for each application to avoid cross chaining of ownership, which makes security configuration more complex and degrades system performance.

Document all application object ownership in the System Security Plan and authorize with the IAO.