MS SQL Server 2014 Instance STIG

MS SQL Server 2014 Instance Security Technical Implementation Guide

ID Vuln ID Title Cat Status
SQL4-00-012400 V-213818 SQL Server must include organization-defined additional, more detailed information in Trace or Audit records for events identified by type, location, or subject. Cat II
SQL4-00-014100 V-213825 SQL Server and the operating system must protect SQL Server audit features from unauthorized removal. Cat II
SQL4-00-012300 V-213817 SQL Server must produce Trace or Audit records containing sufficient information to establish the identity of any user/subject associated with the event. Cat II
SQL4-00-033900 V-213873 SQL Server and Windows must enforce access restrictions associated with changes to the configuration of the SQL Server instance or database(s). Cat II
SQL4-00-012200 V-213816 SQL Server must produce Trace or Audit records containing sufficient information to establish the outcome (success or failure) of the events. Cat II
SQL4-00-031100 V-213862 SQL Server must use NIST FIPS 140-2 validated cryptographic modules for cryptographic operations. Cat I
SQL4-00-035700 V-213882 SQL Server must produce Trace or Audit records when unsuccessful attempts to access security objects occur. Cat II
SQL4-00-038900 V-213894 If SQL Server authentication, using passwords, is employed, SQL Server must enforce the DoD standards for password complexity. Cat II
SQL4-00-016700 V-213835 SQL Server must have the SQL Server Integration Services (SSIS) software component removed if it is unused. Cat II
SQL4-00-036000 V-213883 SQL Server must generate Trace or Audit records when privileges/permissions are added. Cat II
SQL4-00-015400 V-213828 SQL Server software installation account(s) must be restricted to authorized users. Cat II
SQL4-00-039100 V-213898 The SQL Server Browser service must be disabled if its use is not necessary.. Cat III
SQL4-00-016500 V-213833 SQL Server must have the SQL Server Data Tools (SSDT) software component removed if it is unused. Cat II
SQL4-00-034200 V-213875 SQL Server must disable communication protocols not required for operation. Cat II
SQL4-00-015500 V-213829 Database software directories, including SQL Server configuration files, must be stored in dedicated directories, separate from the host OS and other applications. Cat III

Print

Display this benchmark in a printer-friendly format for off-line reference. This display does not include any commands.
Print

Version Changes

If there are multiple versions of this benchmark, Xylok can display the differences between any changes in the checks.
Changes