SQL2-00-023600 - SQL Server must be configured to use Windows Integrated Security.

Information

SQL Server Authentication does not provide for many of the authentication requirements of the DoD. In some cases workarounds are present, but the authentication is not as robust and does not provide needed functionality. Without that functionality, SQL Server is vulnerable to authentication attacks. Consideration must be given to the placement of SQL server inside a forest to ensure evaluation of risk within the environment is considered. Risk includes introduction of risk to SQL Server from other applications or workstations as well as risk from introduction of SQL server itself into an established environment.

There may be situations where SQL Server Authentication must remain enabled, because of constraints imposed by a third-party application. In such a case, document the constraint in the system security plan, and obtain signed approval.

Solution

From SQL Server Management Studio, right-click the server, and then click Properties.

Select the Security page. Under Server authentication, select Windows Authentication Mode, and then click OK.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_SQL_Server_2012_V1R20_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-53411r5_rule, STIG-ID|SQL2-00-023600, Vuln-ID|V-41036

Plugin: MS_SQLDB

Control ID: b012b0e07598157adc27140476118485e7cb3a154c61f79fce0d5b0ba80a2a92