Item Search

NameAudit NamePluginCategory
1.1 Ensure Latest SQL Server Cumulative and Security Updates are InstalledCIS SQL Server 2017 Database L1 AWS RDS v1.3.0MS_SQLDB

SYSTEM AND SERVICES ACQUISITION

2.5 Ensure 'Ole Automation Procedures' Server Configuration Option is set to '0'CIS SQL Server 2017 Database L1 AWS RDS v1.3.0MS_SQLDB

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.6 Ensure 'Remote Access' Server Configuration Option is set to '0'CIS SQL Server 2017 Database L1 AWS RDS v1.3.0MS_SQLDB

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.9 Ensure 'Trustworthy' Database Property is set to 'Off'CIS SQL Server 2012 Database L1 DB v1.6.0MS_SQLDB

ACCESS CONTROL

2.10 Ensure 'Trustworthy' Database Property is set to 'Off'CIS SQL Server 2008 R2 DB Engine L1 v1.7.0MS_SQLDB

ACCESS CONTROL

2.11 Ensure SQL Server is configured to use non-standard portsCIS SQL Server 2017 Database L1 AWS RDS v1.3.0MS_SQLDB

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.14 Ensure the 'sa' Login Account has been renamedCIS SQL Server 2017 Database L1 AWS RDS v1.3.0MS_SQLDB

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.15 Ensure 'xp_cmdshell' Server Configuration Option is set to '0'CIS SQL Server 2017 Database L1 AWS RDS v1.3.0MS_SQLDB

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.18 Ensure 'clr strict security' Server Configuration Option is set to '1'CIS SQL Server 2017 Database L1 AWS RDS v1.3.0MS_SQLDB

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.4 Ensure SQL Authentication is not used in contained databasesCIS SQL Server 2017 Database L1 AWS RDS v1.3.0MS_SQLDB

ACCESS CONTROL

3.6 Ensure the SQL Server's SQLAgent Service Account is Not an AdministratorCIS SQL Server 2017 Database L1 AWS RDS v1.3.0MS_SQLDB

ACCESS CONTROL

3.7 Ensure the SQL Server's Full-Text Service Account is Not an AdministratorCIS SQL Server 2017 Database L1 AWS RDS v1.3.0MS_SQLDB

ACCESS CONTROL

3.9 Ensure Windows BUILTIN groups are not SQL LoginsCIS SQL Server 2017 Database L1 AWS RDS v1.3.0MS_SQLDB

ACCESS CONTROL, MEDIA PROTECTION

4.2 Ensure 'CHECK_EXPIRATION' Option is set to 'ON' for All SQL Authenticated Logins Within the Sysadmin RoleCIS SQL Server 2017 Database L1 AWS RDS v1.3.0MS_SQLDB

ACCESS CONTROL

5.2 Ensure External File System Access is disabled - enable cisCIS Sybase 15.0 L1 DB v1.1.0SybaseDB
5.2 Ensure External File System Access is disabled - enable file accessCIS Sybase 15.0 L1 DB v1.1.0SybaseDB
5.3 Ensure 'Login Auditing' is set to 'failed logins'CIS SQL Server 2017 Database L1 AWS RDS v1.3.0MS_SQLDB

AUDIT AND ACCOUNTABILITY

7.3 Ensure Database Backups are EncryptedCIS SQL Server 2017 Database L2 DB v1.3.0MS_SQLDB

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.4 Ensure Network Encryption is Configured and EnabledCIS SQL Server 2017 Database L2 DB v1.3.0MS_SQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.5 Ensure Databases are Encrypted with TDECIS SQL Server 2017 Database L2 DB v1.3.0MS_SQLDB

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

EP11-00-006200 - The EDB Postgres Advanced Server must check the validity of all data inputs except those specifically identified by the organization.EDB PostgreSQL Advanced Server v11 DB Audit v2r4PostgreSQLDB

SYSTEM AND INFORMATION INTEGRITY

SQL2-00-015600 - Database objects must be owned by accounts authorized for ownership.DISA STIG SQL Server 2012 Database Audit v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SQL2-00-016300 - SQL Server must have the publicly available AdventureWorks sample database removed.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SQL2-00-017100 - SQL Server default account sa must be disabled.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SQL2-00-019500 - SQL Server must implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.DISA STIG SQL Server 2012 Database Audit v1r20MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

SQL4-00-016200 - SQL Server must have the publicly available Northwind sample database removed.DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-016300 - SQL Server must have the publicly available pubs sample database removed.DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-017100 - The SQL Server default account [sa] must be disabled.DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-035500 - Software updates to SQL Server must be tested before being applied to production systems.DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

SYSTEM AND INFORMATION INTEGRITY

SQL4-00-035600 - SQL Server must produce Trace or Audit records when security objects are accessed - Event ID 43DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-035600 - SQL Server must produce Trace or Audit records when security objects are accessed - Event ID 83DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-035600 - SQL Server must produce Trace or Audit records when security objects are accessed - Event ID 89DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-035600 - SQL Server must produce Trace or Audit records when security objects are accessed - Event ID 90DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-035600 - SQL Server must produce Trace or Audit records when security objects are accessed - Event ID 91DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-036500 - SQL Server must generate Trace or Audit records when unsuccessful attempts to modify locally-defined security objects occur - Event ID 46DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-036500 - SQL Server must generate Trace or Audit records when unsuccessful attempts to modify locally-defined security objects occur - Event ID 47DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-037500 - SQL Server must generate Trace or Audit records when successful logons or connections occur - Event ID 15DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-037500 - SQL Server must generate Trace or Audit records when successful logons or connections occur - Event ID 16DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-037500 - SQL Server must generate Trace or Audit records when successful logons or connections occur - Event ID 17DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-037500 - SQL Server must generate Trace or Audit records when successful logons or connections occur.DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-037900 - SQL Server must generate Trace or Audit records when logoffs or disconnections occur - Event ID 14DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-037900 - SQL Server must generate Trace or Audit records when logoffs or disconnections occur - Event ID 15DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-037900 - SQL Server must generate Trace or Audit records when logoffs or disconnections occur - Event ID 16DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL6-D0-016200 - The SQL Server default account [sa] must be disabled.DISA MS SQL Server 2016 Instance STIG v3r6 MS_SQLDBMS_SQLDB

ACCESS CONTROL

SQL6-D0-017600 - Remote Data Archive feature must be disabled, unless specifically required and approved.DISA MS SQL Server 2016 Instance STIG v3r6 MS_SQLDBMS_SQLDB

CONFIGURATION MANAGEMENT

SQL6-D0-017800 - The SQL Server Browser service must be disabled unless specifically required and approved.DISA MS SQL Server 2016 Instance STIG v3r6 WindowsWindows

CONFIGURATION MANAGEMENT

SQL6-D0-018000 - If the SQL Server Browser Service is specifically required and approved, SQL instances must be hidden.DISA MS SQL Server 2016 Instance STIG v3r6 MS_SQLDBMS_SQLDB

CONFIGURATION MANAGEMENT

SQLI-22-016200 - The SQL Server default account [sa] must be disabled.DISA Microsoft SQL Server 2022 Instance STIG v1r3 MS_SQLDBMS_SQLDB

ACCESS CONTROL

SQLI-22-016300 - The SQL Server default account [sa] must have its name changed.DISA Microsoft SQL Server 2022 Instance STIG v1r3 MS_SQLDBMS_SQLDB

CONFIGURATION MANAGEMENT

SQLI-22-017600 - The remote Data Archive feature must be disabled unless specifically required and approved.DISA Microsoft SQL Server 2022 Instance STIG v1r3 MS_SQLDBMS_SQLDB

CONFIGURATION MANAGEMENT