SV-213931r617437_rule
V-213931
SRG-APP-000023-DB-000001
SQL6-D0-003800
CAT II
10
Ensure Service Principal Names (SPNs) are properly registered for the SQL Server instance.
Utilize the Microsoft Kerberos Configuration Manager to review Kerberos configuration issues for a given SQL Server instance.
https://www.microsoft.com/en-us/download/details.aspx?id=39046
Alternatively, SPNs for SQL Server can be manually registered.
For other connections that support Kerberos the SPN is registered in the format MSSQLSvc/<FQDN>/<instancename> for a named instance. The format for registering the default instance is MSSQLSvc/<FQDN>.
Using an account with permissions to register SPNs, issue the following commands from a command-prompt:
setspn -S MSSQLSvc/<Fully Qualified Domain Name> <Service Account>
setspn -S MSSQLSvc/<Fully Qualified Domain Name>:<TCP Port> <Service Account>
For a named instance, use:
setspn -S MSSQLSvc/<FQDN>/<instancename> <Service Account>
setspn -S MSSQLSvc/<FQDN>/<instancename>:<TCP Port> <Service Account>
Restart the SQL Server instance.
More information regarding this process is available at:
https://docs.microsoft.com/en-us/sql/database-engine/configure-windows/register-a-service-principal-name-for-kerberos-connections#Manual
If the SQL Server is not part of an Active Directory domain, this finding is Not Applicable.
Obtain the fully qualified domain name of the SQL Server instance:
Launch Windows Explorer.
Right-click on "Computer" or "This PC" (Varies by OS level), click "Properties".
Note the value shown for "Full computer name".
*** Note: For a cluster, this value must be obtained from the Failover Cluster Manager. ***
Obtain the TCP port that is supporting the SQL Server instance:
Click Start >> Type "SQL Server 2016 Configuration Manager" >> From the search results, click "SQL Server 2016 Configuration Manager".
From the tree on the left, expand "SQL Server Network Configuration".
Click "Protocols for <Instance Name>" where <Instance Name> is the name of the instance (MSSQLSERVER is the default name).
In the right pane, right-click on "TCP/IP" and choose "Properties".
In the window that opens, click the "IP Addresses" tab.
Note the TCP port configured for the instance.
Obtain the service account that is running the SQL Server service:
Click "Start".
Type "SQL Server 2016 Configuration Manager".
From the search results, click "SQL Server 2016 Configuration Manager".
From the tree on the left, select "SQL Server Services".
Note the account listed in the "Log On As" column for the SQL Server instance being reviewed.
Launch a command-line or PowerShell window.
Enter the following command where <Service Account> is the identity of the service account.
setspn -L <Service Account>
Example: setspn -L CONTOSO\sql2016svc
Review the Registered Service Principal Names returned.
If the listing does not contain the following supported service principal names (SPN) formats, this is a finding.
Named instance
MSSQLSvc/<FQDN>:[<port> | <instancename>], where:
MSSQLSvc is the service that is being registered.
<FQDN> is the fully qualified domain name of the server.
<port> is the TCP port number.
<instancename> is the name of the SQL Server instance.
Default instance
MSSQLSvc/<FQDN>:<port> | MSSQLSvc/<FQDN>, where:
MSSQLSvc is the service that is being registered.
<FQDN> is the fully qualified domain name of the server.
<port> is the TCP port number.
If the MSSQLSvc service is registered for any fully qualified domain names that do not match the current server, this may indicate the service account is shared across SQL Server instances. Review server documentation, if the sharing of service accounts across instances is not documented and authorized, this is a finding.
V-213931
False
SQL6-D0-003800
If the SQL Server is not part of an Active Directory domain, this finding is Not Applicable.
Obtain the fully qualified domain name of the SQL Server instance:
Launch Windows Explorer.
Right-click on "Computer" or "This PC" (Varies by OS level), click "Properties".
Note the value shown for "Full computer name".
*** Note: For a cluster, this value must be obtained from the Failover Cluster Manager. ***
Obtain the TCP port that is supporting the SQL Server instance:
Click Start >> Type "SQL Server 2016 Configuration Manager" >> From the search results, click "SQL Server 2016 Configuration Manager".
From the tree on the left, expand "SQL Server Network Configuration".
Click "Protocols for <Instance Name>" where <Instance Name> is the name of the instance (MSSQLSERVER is the default name).
In the right pane, right-click on "TCP/IP" and choose "Properties".
In the window that opens, click the "IP Addresses" tab.
Note the TCP port configured for the instance.
Obtain the service account that is running the SQL Server service:
Click "Start".
Type "SQL Server 2016 Configuration Manager".
From the search results, click "SQL Server 2016 Configuration Manager".
From the tree on the left, select "SQL Server Services".
Note the account listed in the "Log On As" column for the SQL Server instance being reviewed.
Launch a command-line or PowerShell window.
Enter the following command where <Service Account> is the identity of the service account.
setspn -L <Service Account>
Example: setspn -L CONTOSO\sql2016svc
Review the Registered Service Principal Names returned.
If the listing does not contain the following supported service principal names (SPN) formats, this is a finding.
Named instance
MSSQLSvc/<FQDN>:[<port> | <instancename>], where:
MSSQLSvc is the service that is being registered.
<FQDN> is the fully qualified domain name of the server.
<port> is the TCP port number.
<instancename> is the name of the SQL Server instance.
Default instance
MSSQLSvc/<FQDN>:<port> | MSSQLSvc/<FQDN>, where:
MSSQLSvc is the service that is being registered.
<FQDN> is the fully qualified domain name of the server.
<port> is the TCP port number.
If the MSSQLSvc service is registered for any fully qualified domain names that do not match the current server, this may indicate the service account is shared across SQL Server instances. Review server documentation, if the sharing of service accounts across instances is not documented and authorized, this is a finding.
M
3993