Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Release Notes
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Release Notes
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
Item Search
Audits
Item Search
Filters (1)
Description
Filename
Plugin
References
Control ID
Relevance
Description
Plugin
Filename
References (Active)
Search by References
Clear All
‹‹ Previous
Previous
Page 1 of 1
• 10 Total
Next
Next ››
Name
Audit Name
Plugin
Category
SHPT-00-000190 - SharePoint must enforce organizational requirements to implement separation of duties through assigned information access authorizations.
DISA STIG SharePoint 2010 v1r9
Windows
ACCESS CONTROL
SHPT-00-000199 - SharePoint service accounts must be configured for separation of duties.
DISA STIG SharePoint 2010 v1r9
Windows
ACCESS CONTROL
SQL2-00-008800 - SQL Server must enforce separation of duties through assigned information access authorizations - 'server permissions'
DISA STIG SQL Server 2012 DB Instance Security v1r20
MS_SQLDB
ACCESS CONTROL
,
CONFIGURATION MANAGEMENT
SQL2-00-008800 - SQL Server must enforce separation of duties through assigned information access authorizations - 'user defined roles'
DISA STIG SQL Server 2012 DB Instance Security v1r20
MS_SQLDB
ACCESS CONTROL
,
CONFIGURATION MANAGEMENT
SQL2-00-009000 - SQL Server must restrict access to sensitive information to authorized user roles.
DISA STIG SQL Server 2012 DB Instance Security v1r20
MS_SQLDB
ACCESS CONTROL
,
CONFIGURATION MANAGEMENT
SQL2-00-009100 - A single SQL Server database connection configuration file (or a single set of credentials) must not be used to configure all database clients - or a single set of credentials must not be used to configure all clients.
DISA STIG SQL Server 2012 Database OS Audit v1r20
Windows
ACCESS CONTROL
,
CONFIGURATION MANAGEMENT
SQL2-00-009200 - SQL Server must be protected from unauthorized access by developers.
DISA STIG SQL Server 2012 Database Audit v1r20
MS_SQLDB
ACCESS CONTROL
SQL2-00-009300 - SQL Server must be protected from unauthorized access by developers on shared production/development host systems.
DISA STIG SQL Server 2012 Database Audit v1r20
MS_SQLDB
ACCESS CONTROL
SQL2-00-009400 - SQL Server must restrict access to system tables, other configuration information, and metadata to DBAs and other authorized users.
DISA STIG SQL Server 2012 DB Instance Security v1r20
MS_SQLDB
ACCESS CONTROL
,
CONFIGURATION MANAGEMENT
SQL2-00-009500 - Administrative privileges, built-in server roles and built-in database roles must be assigned to the DBMS login accounts that require them via custom roles, and not directly.
DISA STIG SQL Server 2012 Database Audit v1r20
MS_SQLDB
ACCESS CONTROL
‹‹ Previous
Previous
Page 1 of 1
• 10 Total
Next
Next ››