STIGQter STIGQter: STIG Summary: MS SQL Server 2014 Instance Security Technical Implementation Guide Version: 1 Release: 9 Benchmark Date: 26 Oct 2018: SQL Server must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).

DISA Rule

SV-82353r1_rule

Vulnerability Number

V-67863

Group Title

SRG-APP-000148-DB-000103

Rule Version

SQL4-00-018400

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Remove user-accessible shared accounts and use individual userids.

Build/configure applications to ensure successful individual authentication prior to shared account access.

Ensure each user's identity is received and used in audit data in all relevant circumstances.

Check Contents

Review SQL Server users to determine whether shared accounts exist. (This does not include the case where SQL Server has a guest or public account that is providing access to publicly available information.)

If accounts are determined to be shared, determine if individuals are first individually authenticated.

If individuals are not individually authenticated before using the shared account (e.g., by the operating system or possibly by an application making calls to the database), this is a finding.

If accounts are determined to be shared, determine if they are directly accessible to end users. If so, this is a finding.

Vulnerability Number

V-67863

Documentable

False

Rule Version

SQL4-00-018400

Severity Override Guidance

Review SQL Server users to determine whether shared accounts exist. (This does not include the case where SQL Server has a guest or public account that is providing access to publicly available information.)

If accounts are determined to be shared, determine if individuals are first individually authenticated.

If individuals are not individually authenticated before using the shared account (e.g., by the operating system or possibly by an application making calls to the database), this is a finding.

If accounts are determined to be shared, determine if they are directly accessible to end users. If so, this is a finding.

Check Content Reference

M

Target Key

2639

Comments