DISA STIG SQL Server 2016 Instance OS Audit v3r1

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: DISA STIG SQL Server 2016 Instance OS Audit v3r1

Updated: 12/16/2024

Authority: DISA STIG

Plugin: Windows

Revision: 1.1

Estimated Item Count: 23

File Details

Filename: DISA_STIG_MSSQL_2016_Instance-OS_v3r1.audit

Size: 71.2 kB

MD5: a5289492c668aa7273cbd10c1bb94df6
SHA256: 9a7eb65564667bd1cc774f40886c3be3a06879ed2c1b0e42bf77913f69ece1fd

Audit Items

DescriptionCategories
DISA_STIG_MSSQL_2016_Instance-OS_v3r1.audit from DISA MS SQL Server 2016 Instance v3r1 STIG
SQL6-D0-003800 - SQL Server must be configured to utilize the most-secure authentication method available.
SQL6-D0-004000 - SQL Server must protect against a user falsely repudiating by ensuring all accounts are individual, unique, and not shared.
SQL6-D0-006700 - SQL Server software installation account must be restricted to authorized users.
SQL6-D0-006800 - Database software, including DBMS configuration files, must be stored in dedicated directories, separate from the host OS and other applications.
SQL6-D0-007600 - SQL Server must be configured to prohibit or restrict the use of organization-defined protocols as defined in the PPSM CAL and vulnerability assessments.
SQL6-D0-007700 - SQL Server must be configured to prohibit or restrict the use of organization-defined ports, as defined in the PPSM CAL and vulnerability assessments.
SQL6-D0-008300 - Confidentiality of information during transmission is controlled through the use of an approved TLS version.
SQL6-D0-008400 - SQL Server must enforce authorized access to all PKI private keys stored/utilized by SQL Server.
SQL6-D0-008700 - SQL Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.
SQL6-D0-009200 - SQL Server must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.
SQL6-D0-009900 - SQL Server must prevent unauthorized and unintended information transfer via Instant File Initialization (IFI).
SQL6-D0-010000 - Access to database files must be limited to relevant processes and to authorized, administrative users.
SQL6-D0-011200 - SQL Server must record time stamps in audit records and application data that can be mapped to Coordinated Universal Time (UTC, formerly GMT).
SQL6-D0-011500 - Windows must enforce access restrictions associated with changes to the configuration of the SQL Server instance.
SQL6-D0-015600 - SQL Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures.
SQL6-D0-015700 - SQL Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.
SQL6-D0-015800 - SQL Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owners requirements.
SQL6-D0-016000 - SQL Server must configure Customer Feedback and Error Reporting.
SQL6-D0-016100 - SQL Server must configure SQL Server Usage and Error Reporting Auditing - permissions
SQL6-D0-016100 - SQL Server must configure SQL Server Usage and Error Reporting Auditing - SQLTELEMETRY
SQL6-D0-016100 - SQL Server must configure SQL Server Usage and Error Reporting Auditing - SSASTELEMETRY
SQL6-D0-017800 - The SQL Server Browser service must be disabled unless specifically required and approved.