UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

SQL Server must verify there have not been unauthorized changes to SQL Server software and information.


Overview

Finding ID Version Rule ID IA Controls Severity
V-40904 SQL2-00-023900 SV-53258r2_rule Medium
Description
Organizations are required to employ integrity verification applications on information systems to look for evidence of information tampering, errors, and omissions. The organization is also required to employ good software engineering practices with regard to commercial off-the-shelf integrity mechanisms (e.g., parity checks, cyclical redundancy checks, and cryptographic hashes), and to use tools to automatically monitor the integrity of the information system and the applications it hosts. SQL Server opens data files and reads configuration files at system startup, system shutdown, and during abort recovery efforts.
STIG Date
Microsoft SQL Server 2012 Database Instance Security Technical Implementation Guide 2015-06-23

Details

Check Text ( C-47559r2_chk )
Determine if a baselining process, along with a regular comparison, is being performed on SQL Server software. By default, SQL Server is installed in the "program files/microsoft sql server" directory. If baselining and a comparison process are not being performed, this is a finding.
Fix Text (F-46186r1_fix)
Utilize a baselining and comparison process for the SQL Server software files.