STIGQter STIGQter: STIG Summary: MS SQL Server 2014 Database Security Technical Implementation Guide Version: 1 Release: 6 Benchmark Date: 26 Jan 2018:

SQL Server must be monitored to discover unauthorized changes to functions.

DISA Rule

SV-81855r2_rule

Vulnerability Number

V-67365

Group Title

SRG-APP-000133-DB-000179

Rule Version

SQL4-00-014900

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure a SQL Server timed job that automatically checks all system and user-defined Functions for being modified.

(The supplemental file Track.sql, provided with this STIG, can be used to establish a monitoring job. This should be supplemented with a process for informing the appropriate personnel. Other techniques for achieving the same ends, such as the use of DDL triggers, are acceptable.)

Check Contents

Check the SQL Server configuration for a timed job that automatically checks all system and user-defined Functions for being modified by running the following SQL Server query:
EXEC msdb.dbo.sp_help_job @job_name = '<enter . . . job name>';

(Alternatively, in SQL Server Management Studio, navigate to SQL Server Agent and examine the job from there.)

If a timed job or some other method is not implemented to check for Functions being modified, this is a finding.

Vulnerability Number

V-67365

Documentable

False

Rule Version

SQL4-00-014900

Severity Override Guidance

Check the SQL Server configuration for a timed job that automatically checks all system and user-defined Functions for being modified by running the following SQL Server query:
EXEC msdb.dbo.sp_help_job @job_name = '<enter . . . job name>';

(Alternatively, in SQL Server Management Studio, navigate to SQL Server Agent and examine the job from there.)

If a timed job or some other method is not implemented to check for Functions being modified, this is a finding.

Check Content Reference

M

Target Key

2637

Comments