SV-213963r617437_rule
V-213963
SRG-APP-000148-DB-000103
SQL6-D0-007800
CAT II
10
Remove user-accessible shared accounts and use individual userIDs.
Configure applications to ensure successful individual authentication prior to shared account access.
Ensure each user's identity is received and used in audit data in all relevant circumstances.
Review SQL Server users to determine whether shared accounts exist. (This does not include the case where SQL Server has a guest or public account that is providing access to publicly available information.)
If accounts are determined to be shared, determine if individuals are first individually authenticated. Where an application connects to SQL Server using a standard, shared account, ensure that it also captures the individual user identification and passes it to SQL Server.
If individuals are not individually authenticated before using the shared account (e.g., by the operating system or possibly by an application making calls to the database), this is a finding.
If accounts are determined to be shared, determine if they are directly accessible to end users. If so, this is a finding.
V-213963
False
SQL6-D0-007800
Review SQL Server users to determine whether shared accounts exist. (This does not include the case where SQL Server has a guest or public account that is providing access to publicly available information.)
If accounts are determined to be shared, determine if individuals are first individually authenticated. Where an application connects to SQL Server using a standard, shared account, ensure that it also captures the individual user identification and passes it to SQL Server.
If individuals are not individually authenticated before using the shared account (e.g., by the operating system or possibly by an application making calls to the database), this is a finding.
If accounts are determined to be shared, determine if they are directly accessible to end users. If so, this is a finding.
M
3993