SV-82299r1_rule
V-67809
SRG-APP-000133-DB-000179
SQL4-00-015300
CAT II
10
Document the monitoring of security-relevant configuration settings to discover unauthorized changes within the system documentation.
Document the specific users or types of security personnel that are able to monitor security-relevant configuration settings to discover unauthorized changes.
Deploy and implement a third-party tool or some other SQL Server method of monitoring security-relevant configuration settings to discover unauthorized changes.
Verify within the system documentation that SQL Server is monitored for security-relevant configuration settings to discover unauthorized changes.
This can be done by a third-party tool or a SQL script that does baselining and then comparisons.
If the monitoring of security-relevant configuration settings to discover unauthorized changes is not implemented on SQL Server, this is a finding.
V-67809
False
SQL4-00-015300
Verify within the system documentation that SQL Server is monitored for security-relevant configuration settings to discover unauthorized changes.
This can be done by a third-party tool or a SQL script that does baselining and then comparisons.
If the monitoring of security-relevant configuration settings to discover unauthorized changes is not implemented on SQL Server, this is a finding.
M
2639