Database Security Checklist for MS SQL Server 2005 Ver 8, Rel 1.9 Checklist Details (Checklist Revisions)
NOTE
This is not the current revision of this Checklist, view the current revision.
Supporting Resources:
-
Download Prose - SQL Server 2005 Database Security Checklist - Version 8 Release 1.8
- Defense Information Systems Agency
Target:
Target | CPE Name |
---|---|
Microsoft SQL Server 2000 | cpe:/a:microsoft:sql_server:2000 (View CVEs) |
Microsoft SQL Server 2005 | cpe:/a:microsoft:sql_server:2005 (View CVEs) |
Microsoft SQL Server 7.0 | cpe:/a:microsoft:sql_server:7.0 (View CVEs) |
Checklist Highlights
- Checklist Name:
- Database Security Checklist for MS SQL Server 2005
- Checklist ID:
- 157
- Version:
- Ver 8, Rel 1.9
- Type:
- Compliance
- Review Status:
- Final
- Authority:
- Governmental Authority: Defense Information Systems Agency
- Original Publication Date:
- 12/25/2009
Checklist Summary:
The Database Security Readiness Review (SRR) targets conditions that undermine the integrity of security, contribute to inefficient security operations and administration, or may lead to interruption of production operations. Additionally, the review ensures the site has properly installed and implemented the database environment and that it is being managed in a way that is secure, efficient, and effective. The items reviewed are based on Department of Defense (DOD) policy and the Database Security Technical Implementation Guide. Each security item to review is listed in this document with a procedure for measuring compliance with the security requirement. The result of the procedure is a status of compliance with the requirement. Results are assigned as one of the following: O = Open finding or non-compliance NF = Not a Finding or compliance NA = Not Applicable or the item is not applicable to the database version, database use, or host platform being reviewed and, NR = Not Reviewed or the procedure was not completed so compliance is not determined.
Checklist Role:
- Database Server
Known Issues:
The execution of the SQL Server 2005 script and many of the manual procedures require SYSADMIN privileges in the SQL Server instance. Some operating system commands require Administrator privileges to the host operating system. This will vary based on the permissions assigned to the account used. It is recommended the account used for installation of SQL Server be used to process the security review as this account is expected to have access required. Use of this account would be expected to be logged and monitored by an authorized DBA or the IAO.
Target Audience:
Developped for the DOD. This checklist has been created for IT professionals, information security and database personnel. The document assumes that the reader has experience administering Microsoft SQL Server
Target Operational Environment:
- Managed
- Specialized Security-Limited Functionality (SSLF)
Testing Information:
DISA Field Security Operations has assigned a level of urgency to each finding based on Chief Information Officer (CIO) established criteria for certification and accreditation. All findings are based on regulations and guidelines. All findings require correction by the host organization. Category I findings are any vulnerabilities that provide an attacker immediate access into a machine, superuser access, or access that bypasses a firewall. Category II findings are any vulnerabilities that provide information that has a high potential of giving access to an intruder. Category III findings are any vulnerabilities that provide information that potentially could lead to compromise. NOTE: Security patches required by the DOD IAVM process are reviewed during an operating system security review. Information for security patch compliance is available in Appendix A of this Database Security Checklist.
Regulatory Compliance:
Not provided.
Comments/Warnings/Miscellaneous:
Not provided.
Disclaimer:
Not provided.
Product Support:
Not provided.
Point of Contact:
disa.letterkenny.FSO.mbx.stig-customer-support-mailbox@mail.mil
Sponsor:
Not provided.
Licensing:
Not provided.
Change History:
Version 8 Release 1.8 - 24 January 2014 Version 8 Release 1.7 Version 8, Release 1.2 Added point of contact
Dependency/Requirements:
URL | Description |
---|
References:
Reference URL | Description |
---|