UCF STIG Viewer Logo

Database job/batch queues should be reviewed regularly to detect unauthorized database job submissions.


Overview

Finding ID Version Rule ID IA Controls Severity
V-3808 DG0051-SQLServer9 SV-24081r1_rule ECLP-1 Medium
Description
Unauthorized users may bypass security mechanisms by submitting jobs to job queues managed by the database to be run under a more privileged security context of the database or host system. These queues should be monitored regularly to detect any such unauthorized job submissions.
STIG Date
Microsoft SQL Server 2005 Instance Security Technical Implementation Guide 2015-04-03

Details

Check Text ( None )
None
Fix Text (F-22511r1_fix)
Establish and implement procedures to monitor the database job queue and job history for unauthorized job submissions. Include or note documented policy and procedures in the System Security Plan.