Item Search

NameAudit NamePluginCategory
1.1 Ensure Latest SQL Server Cumulative and Security Updates are InstalledCIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

SYSTEM AND SERVICES ACQUISITION

2.2 Ensure 'CLR Enabled' Server Configuration Option is set to '0'CIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

CONFIGURATION MANAGEMENT

2.3 Ensure 'Cross DB Ownership Chaining' Server Configuration Option is set to '0'CIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

ACCESS CONTROL, MEDIA PROTECTION

2.5 Ensure 'Ole Automation Procedures' Server Configuration Option is set to '0'CIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.6 Ensure 'Remote Access' Server Configuration Option is set to '0'CIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.11 Ensure SQL Server is configured to use non-standard portsCIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.12 Ensure 'Hide Instance' option is set to 'Yes' for Production SQL Server instancesCIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.13 Ensure the 'sa' Login Account is set to 'Disabled'CIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

ACCESS CONTROL

2.14 Ensure the 'sa' Login Account has been renamedCIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.15 Ensure 'xp_cmdshell' Server Configuration Option is set to '0'CIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.17 Ensure no login exists with the name 'sa'CIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.18 Ensure 'clr strict security' Server Configuration Option is set to '1'CIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.1 Ensure 'Server Authentication' Property is set to 'Windows Authentication Mode'CIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

ACCESS CONTROL

3.2 Ensure CONNECT permissions on the 'guest' user is Revoked within all SQL Server databasesCIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.2 Ensure CONNECT permissions on the 'guest' user is Revoked within all SQL Server databasesCIS SQL Server 2017 Database L1 AWS RDS v1.3.0MS_SQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.2 Ensure CONNECT permissions on the 'guest' user is Revoked within all SQL Server databasesCIS SQL Server 2016 Database L1 DB v1.4.0MS_SQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.8 Ensure only the default permissions specified by Microsoft are granted to the public server roleCIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.9 Ensure Windows BUILTIN groups are not SQL LoginsCIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.10 Ensure Windows local groups are not SQL LoginsCIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.11 Ensure the public role in the msdb database is not granted access to SQL Agent proxiesCIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.12 Ensure the 'SYSADMIN' Role is Limited to Administrative or Built-in AccountsCIS Microsoft SQL Server 2019 v1.5.2 L1 Database EngineMS_SQLDB

ACCESS CONTROL

4.1 Ensure 'MUST_CHANGE' Option is set to 'ON' for All SQL Authenticated LoginsCIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

IDENTIFICATION AND AUTHENTICATION

4.2 Ensure 'CHECK_EXPIRATION' Option is set to 'ON' for All SQL Authenticated Logins Within the Sysadmin RoleCIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

ACCESS CONTROL

4.3 Ensure 'CHECK_POLICY' Option is set to 'ON' for All SQL Authenticated LoginsCIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

IDENTIFICATION AND AUTHENTICATION

5.1 Ensure 'Maximum number of error log files' is set to greater than or equal to '12'CIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

AUDIT AND ACCOUNTABILITY

5.1.2.1 Ensure 'EXECUTE' is not granted to 'PUBLIC' on 'Non-default' Packages - Non-default PackagesCIS Oracle Server 18c DB Traditional Auditing v1.1.0OracleDB

ACCESS CONTROL

5.1.2.1 Ensure 'EXECUTE' is not granted to 'PUBLIC' on 'Non-default' Packages - Non-default PackagesCIS Oracle Server 18c DB Unified Auditing v1.1.0OracleDB

ACCESS CONTROL

5.2 Ensure 'Default Trace Enabled' Server Configuration Option is set to '1'CIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

AUDIT AND ACCOUNTABILITY

5.3 Ensure 'Login Auditing' is set to 'failed logins'CIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

AUDIT AND ACCOUNTABILITY

5.4 Ensure 'SQL Server Audit' is set to capture both 'failed' and 'successful logins'CIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

AUDIT AND ACCOUNTABILITY

6.1 Ensure Database and Application User Input is SanitizedCIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

SYSTEM AND SERVICES ACQUISITION

6.2 Ensure 'CLR Assembly Permission Set' is set to 'SAFE_ACCESS' for All CLR AssembliesCIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.4 Ensure That the Cloud SQL Database Instance Requires All Incoming Connections To Use SSLCIS Google Cloud Platform Foundation v4.0.0 L1GCP

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure 'Symmetric Key encryption algorithm' is set to 'AES_128' or higher in non-system databasesCIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.2 Ensure Asymmetric Key Size is set to 'greater than or equal to 2048' in non-system databasesCIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

8.1 Ensure 'SQL Server Browser Service' is configured correctlyCIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

CIS_VMware_ESXi_6.7_v1.3.0_L2_Bare_Metal.audit from CIS VMware ESXi 6.7 Benchmark v1.3.0CIS VMware ESXi 6.7 v1.3.0 Level 2 Bare MetalUnix
SQL2-00-008900 - SQL Server processes or services must run under custom, dedicated OS or domain accounts - 'SQL Server Analysis Services'DISA STIG SQL Server 2012 Database OS Audit v1r20Windows

ACCESS CONTROL

SQL2-00-010200 - SQL Server default account sa must have its name changed.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SQL2-00-015610 - In a database owned by [sa], or by any other login having administrative privileges at the instance level, the database property TRUSTWORTHY must be OFF.DISA STIG SQL Server 2012 Database Audit v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SQL2-00-018600 - SQL Server must enforce password encryption for storage.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

IDENTIFICATION AND AUTHENTICATION

SQL4-00-010200 - SQL Server default account [sa] must have its name changed.DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-011410 - Where SQL Server Audit is in use, SQL Server must generate audit records when privileges/permissions are retrieved.DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-015610 - In a database owned by [sa], or by any other login having administrative privileges at the instance level, the database property TRUSTWORTHY must be OFF.DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-015620 - In a database owned by a login not having administrative privileges at the instance level, the database property TRUSTWORTHY must be OFF unless required and authorized.DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-033900 - SQL Server and Windows must enforce access restrictions associated with changes to the configuration of the SQL Server instance or database(s) - s.DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL6-D0-007200 - Access to xp_cmdshell must be disabled, unless specifically required and approved.DISA MS SQL Server 2016 Instance STIG v3r6 MS_SQLDBMS_SQLDB

CONFIGURATION MANAGEMENT

SQL6-D0-016300 - SQL Server default account [sa] must have its name changed.DISA MS SQL Server 2016 Instance STIG v3r6 MS_SQLDBMS_SQLDB

CONFIGURATION MANAGEMENT

SQL6-D0-017000 - Ole Automation Procedures feature must be disabled, unless specifically required and approved.DISA MS SQL Server 2016 Instance STIG v3r6 MS_SQLDBMS_SQLDB

CONFIGURATION MANAGEMENT

SQLI-22-007200 - Access to xp_cmdshell must be disabled unless specifically required and approved.DISA Microsoft SQL Server 2022 Instance STIG v1r3 MS_SQLDBMS_SQLDB

CONFIGURATION MANAGEMENT