STIGQter STIGQter: STIG Summary: MS SQL Server 2016 Instance Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

Remote Access feature must be disabled, unless specifically required and approved.

DISA Rule

SV-214037r617437_rule

Vulnerability Number

V-214037

Group Title

SRG-APP-000141-DB-000093

Rule Version

SQL6-D0-017200

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Disable use of or remove any external application executable object definitions that are not authorized. To disable the use of "Remote Access" option, from the query prompt: 

sp_configure 'show advanced options', 1;
GO
RECONFIGURE;
GO
sp_configure 'remote access', 0;
GO
RECONFIGURE;
GO

Check Contents

To determine if "Remote Access" option is enabled, execute the following query:

EXEC SP_CONFIGURE 'show advanced options', '1';
RECONFIGURE WITH OVERRIDE;
EXEC SP_CONFIGURE 'remote access';

If the value of "config_value" is "0", this is not a finding.

If the value of "config_value" is "1", review the system documentation to determine whether the use of "Remote Access" is required (linked servers) and authorized. If it is not authorized, this is a finding.

Vulnerability Number

V-214037

Documentable

False

Rule Version

SQL6-D0-017200

Severity Override Guidance

To determine if "Remote Access" option is enabled, execute the following query:

EXEC SP_CONFIGURE 'show advanced options', '1';
RECONFIGURE WITH OVERRIDE;
EXEC SP_CONFIGURE 'remote access';

If the value of "config_value" is "0", this is not a finding.

If the value of "config_value" is "1", review the system documentation to determine whether the use of "Remote Access" is required (linked servers) and authorized. If it is not authorized, this is a finding.

Check Content Reference

M

Target Key

3993

Comments