STIGQter STIGQter: STIG Summary: MS SQL Server 2016 Instance Security Technical Implementation Guide Version: 1 Release: 8 Benchmark Date: 24 Jan 2020: SQL Server must generate audit records when unsuccessful attempts to modify categorized information (e.g., classification levels/security levels) occur.

DISA Rule

SV-93979r1_rule

Vulnerability Number

V-79273

Group Title

SRG-APP-000498-DB-000347

Rule Version

SQL6-D0-014000

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Deploy an audit to audit when data classifications are unsuccessfully modified. See the supplemental file "SQL 2016 Audit.sql".

Check Contents

Review the system documentation to determine if SQL Server is required to audit when data classifications are unsuccessfully modified.

If this is not required, this is not a finding.

If the documentation does not exist, this is a finding.

Determine if an audit is configured and started by executing the following query.

SELECT name AS 'Audit Name',
status_desc AS 'Audit Status',
audit_file_path AS 'Current Audit File'
FROM sys.dm_server_audit_status

If no records are returned, this is a finding.

If the auditing the retrieval of privilege/permission/role membership information is required, execute the following query to verify the "SCHEMA_OBJECT_ACCESS_GROUP" is included in the server audit specification.

SELECT a.name AS 'AuditName',
s.name AS 'SpecName',
d.audit_action_name AS 'ActionName',
d.audited_result AS 'Result'
FROM sys.server_audit_specifications s
JOIN sys.server_audits a ON s.audit_guid = a.audit_guid
JOIN sys.server_audit_specification_details d ON s.server_specification_id = d.server_specification_id
WHERE a.is_state_enabled = 1 AND d.audit_action_name = 'SCHEMA_OBJECT_ACCESS_GROUP'

If the "SCHEMA_OBJECT_ACCESS_GROUP" is not returned in an active audit, this is a finding.

Vulnerability Number

V-79273

Documentable

False

Rule Version

SQL6-D0-014000

Severity Override Guidance

Review the system documentation to determine if SQL Server is required to audit when data classifications are unsuccessfully modified.

If this is not required, this is not a finding.

If the documentation does not exist, this is a finding.

Determine if an audit is configured and started by executing the following query.

SELECT name AS 'Audit Name',
status_desc AS 'Audit Status',
audit_file_path AS 'Current Audit File'
FROM sys.dm_server_audit_status

If no records are returned, this is a finding.

If the auditing the retrieval of privilege/permission/role membership information is required, execute the following query to verify the "SCHEMA_OBJECT_ACCESS_GROUP" is included in the server audit specification.

SELECT a.name AS 'AuditName',
s.name AS 'SpecName',
d.audit_action_name AS 'ActionName',
d.audited_result AS 'Result'
FROM sys.server_audit_specifications s
JOIN sys.server_audits a ON s.audit_guid = a.audit_guid
JOIN sys.server_audit_specification_details d ON s.server_specification_id = d.server_specification_id
WHERE a.is_state_enabled = 1 AND d.audit_action_name = 'SCHEMA_OBJECT_ACCESS_GROUP'

If the "SCHEMA_OBJECT_ACCESS_GROUP" is not returned in an active audit, this is a finding.

Check Content Reference

M

Target Key

3219

Comments