SQLI-22-010000 - Access to database files must be limited to relevant processes and to authorized, administrative users.

Information

Applications, including SQL Server, must prevent unauthorized and unintended information transfer via shared system resources. Permitting only DBMS processes and authorized, administrative users to have access to the files where the database resides helps ensure that those files are not shared inappropriately and are not open to backdoor access and manipulation.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Remove any unauthorized permission grants from SQL Server data, log, and backup directories.

1. On the "Security" tab, highlight the user entry.
2. Click "Remove".

See Also

https://dl.dod.cyber.mil/wp-content/uploads/U_MS_SQL_Server_2022_Y25M06_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-4, CAT|II, CCI|CCI-001090, Rule-ID|SV-271329r1108603_rule, STIG-ID|SQLI-22-010000, Vuln-ID|V-271329

Plugin: MS_SQLDB

Control ID: 2f1a14b1d07b278748bf0496d656509b07613475f1715b4701ed43866158128b