Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-2423 | DG0050-SQLServer9 | SV-24079r1_rule | DCSL-1 DCSW-1 | Medium |
Description |
---|
Unmanaged changes that occur to the database software libraries or configuration can lead to unauthorized or compromised installations. |
STIG | Date |
---|---|
Microsoft SQL Server 2005 Instance Security Technical Implementation Guide | 2015-04-03 |
Check Text ( C-28553r1_chk ) |
---|
Review monitoring procedures and implementation evidence to verify that monitoring of changes to database software libraries, related applications and configuration files is done. Verify that the list of files and directories being monitored is complete. If monitoring does not occur or is not complete, this is a Finding. |
Fix Text (F-25723r1_fix) |
---|
Develop, document and implement procedures to monitor for unauthorized changes to DBMS software libraries, related software application libraries and configuration files. If a third-party automated tool is not employed, an automated job that reports file information on the directories and files of interest and compares them to the baseline report for the same will meet this requirement. File hashes or checksums should be used for comparisons as file dates may be manipulated by malicious users. |