SQL2-00-017100 - SQL Server default account sa must be disabled.

Information

SQL Server's 'sa' account has special privileges required to administer the database. The 'sa' account is a well-known SQL Server account and is likely to be targeted by attackers and thus more prone to providing unauthorized access to the database.

This 'sa' default account is administrative and could lead to catastrophic consequences, including the complete loss of control over SQL Server.

If the 'sa' default account is not disabled, an attacker might be able to gain access through the account. SQL Server by default, at installation, disables the 'sa' account.

Some applications that run on SQL Server require the 'sa' account to be enabled in order for the application to function properly. These applications that require the 'sa' account to be enabled are usually legacy systems.

Solution

Modify the enabled flag of SQL Server's 'sa' (sysadmin) account by running the following script. If the account name has been changed per SQL2-00-010200, replace the letters 'sa' in the query with the new name.

USE master;
GO
ALTER LOGIN [sa] DISABLE;

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_SQL_Server_2012_V1R20_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7a., CAT|II, CCI|CCI-000381, Rule-ID|SV-53290r3_rule, STIG-ID|SQL2-00-017100, Vuln-ID|V-40936

Plugin: MS_SQLDB

Control ID: a1d5f69f864b4a9b1c5ea135776b628c17f079ae603feed79f5154ed044c7bbd