UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

MS SQL Server 2014 Instance Security Technical Implementation Guide


Overview

Date Finding Count (94)
2016-06-27 CAT I (High): 5 CAT II (Med): 88 CAT III (Low): 1
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC II - Mission Support Public)

Finding ID Severity Title
V-67871 High SQL Server must use NIST FIPS 140-2 validated cryptographic modules for cryptographic operations.
V-67869 High When using command-line tools such as SQLCMD in a mixed-mode authentication environment, users must use a logon method that does not expose the password.
V-67867 High Applications must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
V-67865 High If passwords are used for authentication, SQL Server must transmit only encrypted representations of passwords.
V-67787 High Where availability is paramount, the SQL Server must continue processing (preferably overwriting existing records, oldest first), in the event of lack of space for more Audit/Trace log records; and must keep processing after any failure of an Audit/Trace.
V-67819 Medium SQL Server must have the publicly available pubs sample database removed.
V-67813 Medium Database software directories, including SQL Server configuration files, must be stored in dedicated directories, separate from the host OS and other applications.
V-67811 Medium SQL Server software installation account(s) must be restricted to authorized users.
V-67817 Medium SQL Server must have the publicly available Northwind sample database removed.
V-67815 Medium The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to SQL Server, etc.) must be restricted to authorized users.
V-67893 Medium SQL Server, the operating system, or the storage system must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75% of maximum audit record storage capacity.
V-67891 Medium SQL Server must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
V-67897 Medium SQL Server must produce time stamps that can be mapped to Coordinated Universal Time (UTC, formerly GMT).
V-67895 Medium SQL Server or software monitoring SQL Server must provide an immediate real-time alert to appropriate support staff of all audit failure events requiring real-time alerts.
V-67899 Medium SQL Server must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.
V-67917 Medium SQL Server must produce Trace or Audit records when security objects are accessed.
V-67915 Medium Software updates to SQL Server must be tested before being applied to production systems.
V-67913 Medium Security-relevant software updates to SQL Server must be installed within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
V-67911 Medium The confidentiality and integrity of information managed by SQL Server must be maintained during reception.
V-67863 Medium SQL Server must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
V-67919 Medium SQL Server must produce Trace or Audit records when unsuccessful attempts to access security objects occur.
V-67795 Medium SQL Server must protect its audit features from unauthorized access, modification, or removal.
V-67797 Medium SQL Server Profiler must be protected from unauthorized access, modification, or removal.
V-67791 Medium The audit information produced by SQL Server must be protected from unauthorized modification.
V-67793 Medium The audit information produced by SQL Server must be protected from unauthorized deletion.
V-67799 Medium Audit tools used in conjunction with SQL Server must be protected from unauthorized access.
V-67861 Medium SQL Server and Windows must be configured to prohibit or restrict the use of unauthorized network ports.
V-67905 Medium SQL Server must disable communication protocols not required for operation.
V-67907 Medium SQL Server must implement and/or support cryptographic mechanisms preventing the unauthorized disclosure of organization-defined information at rest on organization-defined information system components.
V-67879 Medium SQL Server must isolate security functions from nonsecurity functions.
V-67903 Medium SQL Server must produce Trace or Audit records of its enforcement of access restrictions associated with changes to the configuration of the DBMS or database(s).
V-67875 Medium SQL Server must be configured to separate user functionality (including user interface services) from database management functionality.
V-67877 Medium SQL Server must protect data at rest and ensure confidentiality and integrity of data.
V-67909 Medium The confidentiality and integrity of information managed by SQL Server must be maintained during preparation for transmission.
V-67873 Medium SQL Server must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).
V-67783 Medium SQL Server must include organization-defined additional, more detailed information in Trace or Audit records for events identified by type, location, or subject.
V-67781 Medium SQL Server must produce Trace or Audit records containing sufficient information to establish the identity of any user/subject associated with the event.
V-67785 Medium Unless it has been determined that availability is paramount, SQL Server must shut down upon the failure of an Audit, or a Trace used for auditing purposes, to include the unavailability of space for more audit/trace log records.
V-67789 Medium The audit information produced by SQL Server must be protected from unauthorized read access.
V-67849 Medium SQL Server must have the Filestream feature disabled if it is unused.
V-67933 Medium SQL Server must generate Trace or Audit records for all privileged activities or other system-level access.
V-67935 Medium SQL Server must generate Trace or Audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.
V-67937 Medium SQL Server must generate Trace or Audit records when logoffs or disconnections occur.
V-67939 Medium SQL Server must generate Trace or Audit records when concurrent logons/connections by the same user from different workstations occur.
V-67843 Medium SQL Server must have the Data Quality Services software component removed if it is unused.
V-67845 Medium SQL Server must have the Client Tools SDK software component removed if it is unused.
V-67847 Medium SQL Server must have the Management Tools software component removed if it is unused.
V-67779 Medium SQL Server must produce Trace or Audit records containing sufficient information to establish the outcome (success or failure) of the events.
V-67777 Medium SQL Server must produce Trace or Audit records containing sufficient information to establish the sources (origins) of the events.
V-67775 Medium SQL Server must produce Trace or Audit records containing sufficient information to establish where the events occurred.
V-67773 Medium SQL Server must produce Trace or Audit records containing sufficient information to establish when the events occurred.
V-67771 Medium Where SQL Server Audit is in use, SQL Server must generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.
V-67857 Medium Access to xp_cmdshell must be disabled, unless specifically required and approved.
V-67853 Medium The SQL Server default account [sa] must be disabled.
V-67851 Medium Unused database components that are integrated in SQL Server and cannot be uninstalled must be disabled.
V-67859 Medium SQL Server must be configured to prohibit or restrict the use of unauthorized network protocols.
V-67929 Medium SQL Server must generate Trace or Audit records when successful logons or connections occur.
V-67927 Medium SQL Server must generate Trace or Audit records when unsuccessful attempts to delete privileges/permissions occur.
V-67925 Medium SQL Server must generate Trace or Audit records when privileges/permissions are deleted.
V-67923 Medium SQL Server must generate Trace or Audit records when unsuccessful attempts to add privileges/permissions occur.
V-67921 Medium SQL Server must generate Trace or Audit records when privileges/permissions are added.
V-67769 Medium Where SQL Server Audit is in use, SQL Server must generate audit records when privileges/permissions are retrieved.
V-67765 Medium Where SQL Server Trace is in use for auditing purposes, SQL Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be traced.
V-67767 Medium Where SQL Server Audit is in use, SQL Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited at the server level.
V-67761 Medium SQL Server must enforce approved authorizations for logical access to server-level system resources in accordance with applicable access control policies.
V-67763 Medium SQL Server must protect against an individual using a shared account from falsely denying having performed a particular action.
V-67931 Medium SQL Server must generate Trace or Audit records when unsuccessful logons or connection attempts occur.
V-67823 Medium SQL Server must have the SQL Server Data Tools (SSDT) software component removed if it is unused.
V-67821 Medium SQL Server must have the publicly available AdventureWorks sample database removed.
V-67827 Medium SQL Server must have the SQL Server Integration Services (SSIS) software component removed if it is unused.
V-67825 Medium SQL Server must have the SQL Server Reporting Services (SSRS) software component removed if it is unused.
V-67829 Medium SQL Server must have the SQL Server Analysis Services (SSAS) software component removed if it is unused.
V-67759 Medium SQL Server authentication and identity management must be integrated with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.
V-67841 Medium SQL Server must have the Data Quality Client software component removed if it is unused.
V-67757 Medium The number of concurrent SQL Server sessions for each system account must be limited.
V-67831 Medium SQL Server must have the SQL Server Distributed Replay Client software component removed if it is unused.
V-67833 Medium SQL Server must have the SQL Server Distributed Replay Controller software component removed if it is unused.
V-67835 Medium SQL Server must have the Full-Text Search software component removed if it is unused.
V-67837 Medium SQL Server must have the Master Data Services software component removed if it is unused.
V-67839 Medium SQL Server must have the SQL Server Replication software component removed if it is unused.
V-67941 Medium SQL Server must off-load audit data to a separate log management facility; this must be continuous and in near real time for systems with a network connection to the storage facility and weekly or more often for stand-alone systems.
V-67943 Medium If SQL Server authentication, using passwords, is employed, SQL Server must enforce the DoD standards for password complexity.
V-67945 Medium If SQL Server authentication, using passwords, is employed, SQL Server must enforce the DoD standards for password lifetime.
V-67809 Medium SQL Server security-relevant configuration settings must be monitored to discover unauthorized changes.
V-67805 Medium SQL Server and the operating system must protect SQL Server audit features from unauthorized removal.
V-67807 Medium Software, applications, and configuration files that are part of, or related to, the SQL Server installation must be monitored to discover unauthorized changes.
V-67803 Medium SQL Server and/or the operating system must protect its audit configuration from unauthorized modification.
V-67901 Medium SQL Server and Windows must enforce access restrictions associated with changes to the configuration of the SQL Server instance or database(s).
V-67885 Medium SQL Server must prevent non-privileged users from executing privileged functionality, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
V-67887 Medium Execution of software modules (to include stored procedures, functions, and triggers) with elevated privileges must be restricted to necessary cases only.
V-67881 Medium Access to database files must be limited to relevant processes and to authorized, administrative users.
V-67883 Medium SQL Server must automatically terminate a user session after organization-defined conditions or trigger events requiring session disconnect.
V-67889 Medium SQL Server must utilize centralized management of the content captured in audit records generated by all components of the DBMS.
V-67855 Low SQL Server default account [sa] must have its name changed.