STIGQter STIGQter: STIG Summary: MS SQL Server 2016 Instance Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

SQL Server must protect its audit features from unauthorized removal.

DISA Rule

SV-213949r617437_rule

Vulnerability Number

V-213949

Group Title

SRG-APP-000123-DB-000204

Rule Version

SQL6-D0-006400

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Remove audit-related permissions from individuals and roles not authorized to have them.

USE master;
DENY [ALTER ANY SERVER AUDIT] TO [User];
GO

Check Contents

Check the server documentation for a list of approved users with access to SQL Server Audits.

To alter, or drop a server audit, principals require the ALTER ANY SERVER AUDIT or the CONTROL SERVER permission.

Review the SQL Server permissions granted to principals. Look for permissions ALTER ANY SERVER AUDIT, ALTER ANY DATABASE AUDIT, CONTROL SERVER:

SELECT login.name, perm.permission_name, perm.state_desc
FROM sys.server_permissions perm
JOIN sys.server_principals login
ON perm.grantee_principal_id = login.principal_id
WHERE permission_name in ('CONTROL SERVER', 'ALTER ANY DATABASE AUDIT', 'ALTER ANY SERVER AUDIT')
and login.name not like '##MS_%';

If unauthorized accounts have these privileges, this is a finding.

Vulnerability Number

V-213949

Documentable

False

Rule Version

SQL6-D0-006400

Severity Override Guidance

Check the server documentation for a list of approved users with access to SQL Server Audits.

To alter, or drop a server audit, principals require the ALTER ANY SERVER AUDIT or the CONTROL SERVER permission.

Review the SQL Server permissions granted to principals. Look for permissions ALTER ANY SERVER AUDIT, ALTER ANY DATABASE AUDIT, CONTROL SERVER:

SELECT login.name, perm.permission_name, perm.state_desc
FROM sys.server_permissions perm
JOIN sys.server_principals login
ON perm.grantee_principal_id = login.principal_id
WHERE permission_name in ('CONTROL SERVER', 'ALTER ANY DATABASE AUDIT', 'ALTER ANY SERVER AUDIT')
and login.name not like '##MS_%';

If unauthorized accounts have these privileges, this is a finding.

Check Content Reference

M

Target Key

3993

Comments