Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-15642 | DG0138-SQLServer9 | SV-25369r1_rule | ECAN-1 | Medium |
Description |
---|
Unauthorized access to sensitive data may compromise the confidentiality of personnel privacy, threaten national security or compromise a variety of other sensitive operations. Access controls are best managed by defining requirements based on distinct job functions and assigning access based on the job function assigned to the individual user. |
STIG | Date |
---|---|
Microsoft SQL Server 2005 Database Security Technical Implementation Guide | 2015-04-03 |
Check Text ( C-13841r1_chk ) |
---|
If no data is identified as being sensitive or classified by the Information Owner, in the System Security Plan or in the AIS Functional Architecture documentation, this check is Not a Finding. If no identified sensitive or classified data requires encryption by the Information Owner in the System Security Plan and/or AIS Functional Architecture documentation, this check is Not a Finding. Review data access requirements for sensitive data as identified and assigned by the Information Owner in the System Security Plan. Review the access controls for sensitive data configured in the database. If the configured access controls do not match those defined in the System Security Plan, this is a Finding. |
Fix Text (F-23502r1_fix) |
---|
Define, document and implement all sensitive data access controls based on job function in the System Security Plan. |