DISA Microsoft SQL Server 2022 Instance STIG v1r1 MS_SQLDB

Audit Details

Name: DISA Microsoft SQL Server 2022 Instance STIG v1r1 MS_SQLDB

Updated: 11/26/2025

Authority: DISA STIG

Plugin: MS_SQLDB

Revision: 1.0

Estimated Item Count: 75

File Details

Filename: DISA_STIG_Microsoft_SQL_Server_2022_Instance_v1r1_MS_SQLDB.audit

Size: 242 kB

MD5: f7ae230ac63f901d20f1002b566b5eb2
SHA256: 0e6ad99ee0ef7827bd0e018cbf781fc62840d9d66fe67b636e9945b2228593e4

Audit Items

DescriptionCategories
SQLI-22-003600 - SQL Server must limit the number of concurrent sessions to an organization-defined number per user for all accounts and/or account types.

ACCESS CONTROL

SQLI-22-003700 - SQL Server must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.

ACCESS CONTROL

SQLI-22-003800 - SQL Server must be configured to use the most-secure authentication method available.

ACCESS CONTROL

SQLI-22-003900 - SQL Server must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.

ACCESS CONTROL

SQLI-22-004000 - SQL Server must protect against a user falsely repudiating by ensuring all accounts are individual, unique, and not shared.

AUDIT AND ACCOUNTABILITY

SQLI-22-004100 - SQL Server must protect against a user falsely repudiating by ensuring the NT AUTHORITY SYSTEM account is not used for administration.

AUDIT AND ACCOUNTABILITY

SQLI-22-004200 - SQL Server must protect against a user falsely repudiating by ensuring only clearly unique Active Directory user accounts can connect to the instance.

AUDIT AND ACCOUNTABILITY

SQLI-22-004250 - SQL Server must protect against a user falsely repudiating by ensuring that only clearly unique Active Directory user accounts can connect to the database.

AUDIT AND ACCOUNTABILITY

SQLI-22-004300 - SQL Server must be configured to generate audit records for DOD-defined auditable events within all DBMS/database components.

AUDIT AND ACCOUNTABILITY

SQLI-22-004400 - SQL Server must allow only the information system security manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.

AUDIT AND ACCOUNTABILITY

SQLI-22-004600 - SQL Server must generate audit records when attempts to access privileges, categorized information, and security objects occur.

AUDIT AND ACCOUNTABILITY

SQLI-22-004700 - SQL Server must initiate session auditing upon startup.

AUDIT AND ACCOUNTABILITY

SQLI-22-005500 - SQL Server must include additional, more detailed, organization-defined information in the audit records for audit events identified by type, location, or subject.

AUDIT AND ACCOUNTABILITY

SQLI-22-005900 - The audit information produced by SQL Server must be protected from unauthorized access, modification, and deletion.

AUDIT AND ACCOUNTABILITY

SQLI-22-006300 - SQL Server must protect its audit configuration from authorized and unauthorized access and modification.

AUDIT AND ACCOUNTABILITY

SQLI-22-006500 - SQL Server must limit privileges to change software modules and links to software external to SQL Server.

CONFIGURATION MANAGEMENT

SQLI-22-006600 - SQL Server must limit privileges to change software modules, to include stored procedures, functions and triggers, and links to software external to SQL Server.

CONFIGURATION MANAGEMENT

SQLI-22-006700 - SQL Server software installation account must be restricted to authorized users.

CONFIGURATION MANAGEMENT

SQLI-22-006800 - Database software, including DBMS configuration files, must be stored in dedicated directories, separate from the host OS and other applications.

CONFIGURATION MANAGEMENT

SQLI-22-006900 - Default demonstration and sample databases, database objects, and applications must be removed.

CONFIGURATION MANAGEMENT

SQLI-22-007000 - Unused database components, DBMS software, and database objects must be removed.

CONFIGURATION MANAGEMENT

SQLI-22-007200 - Access to xp_cmdshell must be disabled unless specifically required and approved.

CONFIGURATION MANAGEMENT

SQLI-22-007300 - Access to common language runtime (CLR) code must be disabled or restricted unless specifically required and approved.

CONFIGURATION MANAGEMENT

SQLI-22-007400 - Access to nonstandard, extended stored procedures must be disabled or restricted, unless specifically required and approved.

CONFIGURATION MANAGEMENT

SQLI-22-007500 - Access to linked servers must be disabled or restricted, unless specifically required and approved.

CONFIGURATION MANAGEMENT

SQLI-22-007600 - SQL Server must be configured to prohibit or restrict the use of organization-defined protocols as defined in the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL) and vulnerability assessments.

CONFIGURATION MANAGEMENT

SQLI-22-007700 - SQL Server must be configured to prohibit or restrict the use of organization-defined ports, as defined in the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL) and vulnerability assessments.

CONFIGURATION MANAGEMENT

SQLI-22-007800 - SQL Server must uniquely identify and authenticate users (or processes acting on behalf of organizational users).

IDENTIFICATION AND AUTHENTICATION

SQLI-22-007900 - If DBMS authentication using passwords is employed, SQL Server must enforce the DOD standards for password complexity and lifetime.

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

SQLI-22-008000 - Contained databases must use Windows principals.

IDENTIFICATION AND AUTHENTICATION

SQLI-22-008200 - If passwords are used for authentication, SQL Server must transmit only encrypted representations of passwords.

IDENTIFICATION AND AUTHENTICATION

SQLI-22-009500 - SQL Server must protect the confidentiality and integrity of all information at rest.

SYSTEM AND COMMUNICATIONS PROTECTION

SQLI-22-009600 - The Service Master Key must be backed up and stored in a secure location that is not on the SQL Server.

SYSTEM AND COMMUNICATIONS PROTECTION

SQLI-22-009700 - The Master Key must be backed up and stored in a secure location that is not on the SQL Server.

SYSTEM AND COMMUNICATIONS PROTECTION

SQLI-22-009800 - SQL Server must prevent unauthorized and unintended information transfer via shared system resources.

SYSTEM AND COMMUNICATIONS PROTECTION

SQLI-22-009900 - SQL Server must prevent unauthorized and unintended information transfer via Instant File Initialization (IFI).

SYSTEM AND COMMUNICATIONS PROTECTION

SQLI-22-010000 - Access to database files must be limited to relevant processes and to authorized, administrative users.

SYSTEM AND COMMUNICATIONS PROTECTION

SQLI-22-010010 - SQL Server and associated applications must reserve the use of dynamic code execution for situations that require it.

SYSTEM AND INFORMATION INTEGRITY

SQLI-22-010020 - SQL Server and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.

SYSTEM AND INFORMATION INTEGRITY

SQLI-22-010100 - SQL Server must reveal detailed error messages only to documented and approved individuals or roles.

SYSTEM AND INFORMATION INTEGRITY

SQLI-22-010400 - SQL Server must prevent nonprivileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.

ACCESS CONTROL

SQLI-22-010500 - Use of credentials and proxies must be restricted to necessary cases only.

ACCESS CONTROL

SQLI-22-010900 - SQL Server must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.

AUDIT AND ACCOUNTABILITY

SQLI-22-011000 - SQL Server must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75 percent of maximum audit record storage capacity.

AUDIT AND ACCOUNTABILITY

SQLI-22-011100 - SQL Server must provide an immediate real-time alert to appropriate support staff of all audit log failures.

AUDIT AND ACCOUNTABILITY

SQLI-22-011400 - SQL Server must enforce access restrictions associated with changes to the configuration of the instance.

CONFIGURATION MANAGEMENT

SQLI-22-011500 - Windows must enforce access restrictions associated with changes to the configuration of the SQL Server instance.

CONFIGURATION MANAGEMENT

SQLI-22-011800 - SQL Server must produce audit records when attempts to modify SQL Server configuration and privileges occur within the database(s).

AUDIT AND ACCOUNTABILITY

SQLI-22-012300 - SQL Server must maintain a separate execution domain for each executing process.

SYSTEM AND COMMUNICATIONS PROTECTION

SQLI-22-012400 - SQL Server services must be configured to run under unique dedicated user accounts.

SYSTEM AND COMMUNICATIONS PROTECTION