SQLI-22-004600 - SQL Server must generate audit records when attempts to access privileges, categorized information, and security objects occur.

Information

Under some circumstances, it may be useful to monitor who/what is reading privilege/permission/role information. Therefore, monitoring must be possible. DBMSs typically make such information available through views or functions.

This requirement includes explicit requests for privilege/permission/role membership information. It does not refer to the implicit retrieval of privileges/permissions/role memberships that SQL Server continually performs to determine if any and every action on the database is permitted.

Changes to the security configuration must also be tracked.

Security configuration tracking applies to situations where security data is retrieved or modified via data manipulation operations, as opposed to via specialized security functionality.

In a SQL environment, types of access include but are not necessarily limited to:
SELECT
INSERT
UPDATE
DELETE
EXECUTE

Changes in categorized information must be tracked. Without an audit trail, unauthorized access to protected data could go undetected.

For detailed information on categorizing information, refer to FIPS Publication 199, Standards for Security Categorization of Federal Information and Information Systems, and FIPS Publication 200, Minimum Security Requirements for Federal Information and Information Systems.

To aid in diagnosis, it is necessary to track failed attempts in addition to the successful ones.

Satisfies: SRG-APP-000091-DB-000325, SRG-APP-000091-DB-000066, SRG-APP-000492-DB-000332, SRG-APP-000492-DB-000333, SRG-APP-000494-DB-000344, SRG-APP-000494-DB-000345, SRG-APP-000498-DB-000346, SRG-APP-000498-DB-000347, SRG-APP-000502-DB-000348, SRG-APP-000502-DB-000349, SRG-APP-000507-DB-000356, SRG-APP-000507-DB-000357

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Deploy an audit to log when attempts to access privileges, categorized information, security objects, and any other specific objects occur.

Refer to the supplemental file "SQL 2022 Audit.sql".

See Also

https://dl.dod.cyber.mil/wp-content/uploads/U_MS_SQL_Server_2022_Y25M06_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-12c., CAT|II, CCI|CCI-000172, Rule-ID|SV-271272r1109110_rule, STIG-ID|SQLI-22-004600, Vuln-ID|V-271272

Plugin: MS_SQLDB

Control ID: 494d35914b17de9b5a71b02c9d6920f923d16878f8fbbce4931fd9fafac5cb76