Information
Windows domain/enterprise authentication and identification must be used (SQL2-00-023600). Native SQL Server authentication may be used only when circumstances make it unavoidable; and must be documented and AO-approved.
The DoD standard for authentication is DoD-approved PKI certificates. Authentication based on User ID and Password may be used only when it is not possible to employ a PKI certificate, and requires AO approval.
In such cases, the DoD standards for password complexity must be implemented.
The requirements for password complexity are:
a. minimum of 15 Characters, 1 of each of the following character sets:
- Upper-case
- Lower-case
- Numeric
- Special characters (e.g. ~ ! @ # $ % ^ & * ( ) _ + = - ' [ ] / ? > <)];
b. Minimum number of characters changed from previous password: 50% of the minimum password length (that is, 8).
To enforce this in SQL Server, configure each DBMS-managed login to inherit the rules from Windows.
NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.
Solution
For each SQL Server Login identified in the Check as out of compliance:
In SQL Server Management Studio Object Explorer, navigate to <SQL Server instance name> >> Security >> Logins >> <login name>. Right-click, select Properties. Select the check box Enforce Password Policy. Click OK.
Alternatively, for each identified Login, run the statement:
ALTER LOGIN <login name> CHECK_POLICY = ON;
Item Details
Category: IDENTIFICATION AND AUTHENTICATION
References: 800-53|IA-5(1)(a), 800-53|IA-5(1)(b), CAT|II, CCI|CCI-000192, CCI|CCI-000193, CCI|CCI-000194, CCI|CCI-000195, CCI|CCI-000205, CCI|CCI-001619, Rule-ID|SV-87037r1_rule, STIG-ID|SQL2-00-038900, Vuln-ID|V-72413
Control ID: efe9d0036473629978340a6d105fa2220272cec7738fd5bb6baee22a4344d17f