Revision 1.12Feb 25, 2026

Functional Update
  • DISA_STIG_MSSQL_2012_Instance-OS_v1r20.audit from DISA Microsoft SQL Server Instance 2012 v1r20 STIG
  • SQL2-00-009100 - A single SQL Server database connection configuration file (or a single set of credentials) must not be used to configure all database clients - or a single set of credentials must not be used to configure all clients.
  • SQL2-00-009900 - OS and domain accounts utilized to run external procedures called by SQL Server must have limited privileges.
  • SQL2-00-010000 - DBA OS or domain accounts must be granted only those host system privileges necessary for the administration of SQL Server.
  • SQL2-00-010100 - Use of the SQL Server software installation account must be restricted to SQL Server software installation.
  • SQL2-00-010600 - SQL Server must have allocated audit record storage capacity to meet the organization-defined requirements for saving audit record information.
  • SQL2-00-014600 - SQL Server must support the organizational requirement to employ automated mechanisms for enforcing access restrictions.
  • SQL2-00-015350 - Software, applications, and configuration files that are part of, or related to, the SQL Server 2012 installation must be monitored to discover unauthorized changes.
  • SQL2-00-015355 - Software, applications, and configuration files that are part of, or related to, the SQL Server 2012 installation must be audited.
  • SQL2-00-015400 - SQL Server software installation account(s) must be restricted to authorized users.
  • SQL2-00-015500 - Database software directories, including SQL Server configuration files, must be stored in dedicated directories, separate from the host OS and other applications.
  • SQL2-00-039100 - The SQL Server Browser service must be disabled if its use is not necessary.
Miscellaneous
  • Metadata updated.
  • Platform check updated.
  • References updated.
  • Variables updated.