SV-82285r2_rule
V-67795
SRG-APP-000121-DB-000202
SQL4-00-013900
CAT II
10
Remove audit-related permissions from individuals and roles not authorized to have them.
Check the server documentation for a list of approved users with access to SQL Server Audits.
To create, alter, or drop a server audit, principals require the "ALTER ANY SERVER AUDIT" or the "CONTROL SERVER" permission. To view an Audit log requires the "CONTROL SERVER" permission. To use Profiler, "ALTER TRACE" is required.
Review the SQL Server permissions granted to principals. Look for permissions "ALTER ANY SERVER AUDIT", "ALTER ANY DATABASE AUDIT", "CONTROL SERVER", and "ALTER TRACE":
SELECT login.name, perm.permission_name, perm.state_desc
FROM sys.server_permissions perm -- or STIG.server_permissions
JOIN sys.server_principals login
ON perm.grantee_principal_id = login.principal_id
WHERE permission_name in ('CONTROL SERVER', 'ALTER ANY DATABASE AUDIT', 'ALTER ANY SERVER AUDIT','ALTER TRACE')
and login.name not like '##MS_%';
If unauthorized accounts have these privileges, this is a finding.
V-67795
False
SQL4-00-013900
Check the server documentation for a list of approved users with access to SQL Server Audits.
To create, alter, or drop a server audit, principals require the "ALTER ANY SERVER AUDIT" or the "CONTROL SERVER" permission. To view an Audit log requires the "CONTROL SERVER" permission. To use Profiler, "ALTER TRACE" is required.
Review the SQL Server permissions granted to principals. Look for permissions "ALTER ANY SERVER AUDIT", "ALTER ANY DATABASE AUDIT", "CONTROL SERVER", and "ALTER TRACE":
SELECT login.name, perm.permission_name, perm.state_desc
FROM sys.server_permissions perm -- or STIG.server_permissions
JOIN sys.server_principals login
ON perm.grantee_principal_id = login.principal_id
WHERE permission_name in ('CONTROL SERVER', 'ALTER ANY DATABASE AUDIT', 'ALTER ANY SERVER AUDIT','ALTER TRACE')
and login.name not like '##MS_%';
If unauthorized accounts have these privileges, this is a finding.
M
2639