Microsoft Azure SQL Managed Instance Security Technical Implementation Guide

Overview

VersionDateFinding Count (84)Downloads
V1R12025-10-07CAT I (High): 8CAT II (Medium): 74CAT III (Low): 2
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC II - Mission Support Classified

Finding IDSeverityTitleDescription
V-276227
LOWMEDIUMHIGH
Database objects must be owned by Azure SQL Managed Instance principals authorized for ownership.Within the database, object ownership implies full privileges to the owned object, including the privilege to assign access to the owned objects to ot...
V-276228
LOWMEDIUMHIGH
The role(s)/group(s) used to modify database structure and logic modules inside Azure SQL Server Managed Instance must be restricted to authorized users.If the Azure SQL Managed Instance were to allow any user to make changes to database structure or logic, then those changes might be implemented witho...
V-276229
LOWMEDIUMHIGH
Azure SQL Managed Instance contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.Applications, including DBMSs, must prevent unauthorized and unintended information transfer via shared system resources. Data used for the developme...
V-276230
LOWMEDIUMHIGH
Azure SQL Managed Instance and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.With respect to database management systems, one class of threat is known as SQL Injection, or more generally, code injection. It takes advantage of t...
V-276231
LOWMEDIUMHIGH
Azure SQL Managed Instance must associate organization-defined types of security labels having organization-defined security label values with information.Without the association of security labels to information, there is no basis for Azure SQL Managed Instance to make security-related access-control de...
V-276232
LOWMEDIUMHIGH
Azure SQL Managed Instance must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should ...
V-276233
LOWMEDIUMHIGH
Azure SQL Managed Instance must restrict execution of stored procedures and functions that utilize "execute as" to necessary cases only.In certain situations, to provide required functionality, a database management system (DBMS) needs to execute internal logic (stored procedures, func...
V-276234
LOWMEDIUMHIGH
Azure SQL Managed Instance must prohibit user installation of logic modules without explicit privileged status.Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malicious software will be inst...
V-276235
LOWMEDIUMHIGH
Azure SQL Managed Instance must enforce access restrictions associated with changes to the configuration of the database(s).Failure to provide logical access restrictions associated with changes to configuration may have significant effects on the overall security of the sy...
V-276237
LOWMEDIUMHIGH
Azure SQL Managed Instance must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest on organization-defined information system components.Azure SQL Managed Instance databases handling data requiring data-at-rest protections must employ cryptographic mechanisms to prevent unauthorized dis...
V-276238
LOWMEDIUMHIGH
Azure SQL Managed Instance must implement cryptographic mechanisms preventing the unauthorized disclosure of organization-defined information at rest on organization-defined information system components.Azure SQL Managed Instance handling data requiring data-at-rest protections must employ cryptographic mechanisms to prevent unauthorized disclosure an...
V-276239
LOWMEDIUMHIGH
When invalid inputs are received, the Azure SQL Managed Instance must behave in a predictable and documented manner that reflects organizational and system objectives.A common vulnerability is unplanned behavior when invalid inputs are received. This requirement guards against adverse or unintended system behavior c...
V-276240
LOWMEDIUMHIGH
Azure SQL Managed Instance must protect against a user falsely repudiating by ensuring only clearly unique Active Directory user accounts can connect to the database.Nonrepudiation of actions taken is required to maintain data integrity. Examples of particular actions taken by individuals include creating informati...
V-276241
LOWMEDIUMHIGH
Azure SQL Managed Instance must protect against a user falsely repudiating by use of system-versioned tables (Temporal Tables).Nonrepudiation of actions taken is required to maintain data integrity. Examples of particular actions taken by individuals include creating informati...
V-276242
LOWMEDIUMHIGH
The Azure SQL Managed Instance must be able to generate audit records when attempts to retrieve privileges/permissions occur.Under some circumstances, it may be useful to monitor who/what is reading privilege/permission/role information; therefore, it must be possible to con...
V-276243
LOWMEDIUMHIGH
Azure SQL Managed Instance must initiate session auditing upon startup.Session auditing is used when a user's activities are under investigation. To ensure capture of all activity during those periods when session auditin...
V-276244
LOWMEDIUMHIGH
Azure SQL Managed Instance default demonstration and sample databases, database objects, and applications must be removed.Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, provided by default, may no...
V-276245
LOWMEDIUMHIGH
The Azure SQL Managed Instance audit storage account must be configured to prohibit public access.To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within d...
V-276246
LOWMEDIUMHIGH
The Azure SQL Managed Instance must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the Ports, Protocols, and Services Management Category Assurance List (PPSM CAL) and vulnerability assessments.To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within d...
V-276247
LOWMEDIUMHIGH
Azure SQL Managed Instance must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).To ensure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and...
V-276248
LOWMEDIUMHIGH
Azure SQL Managed Instance must map the PKI-authenticated identity to an associated user account.The DOD standard for authentication is DOD-approved PKI certificates. Once a PKI certificate has been validated, it must be mapped to an Azure SQL Man...
V-276249
LOWMEDIUMHIGH
Azure SQL Managed Instance must uniquely identify and authenticate nonorganizational users (or processes acting on behalf of nonorganizational users).Nonorganizational users include all information system users other than organizational users, which include organizational employees or individuals th...
V-276250
LOWMEDIUMHIGH
Azure SQL Managed Instance must separate user functionality (including user interface services) from database management functionality.Information system management functionality includes functions necessary to administer databases, network components, workstations, or servers and typ...
V-276252
LOWMEDIUMHIGH
Azure SQL Managed Instance must be able to allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.To ensure sufficient storage capacity for the audit logs, the database management system (DBMS) must be able to allocate audit record storage capacity...
V-276253
LOWMEDIUMHIGH
Azure SQL Managed Instance must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75 percent of maximum audit record storage capacity.Auditing for Azure SQL Managed Instance tracks database events and writes them to an audit log in the Azure storage account, Log Analytics workspace, ...
V-276254
LOWMEDIUMHIGH
Azure SQL Managed Instance must generate audit records when security objects are modified.Changes in the database objects (tables, views, procedures, functions) that record and control permissions, privileges, and roles granted to users and...
V-276255
LOWMEDIUMHIGH
Azure SQL Managed Instance must generate audit records when attempts to modify categorized information (e.g., classification levels/security levels) occur.Changes in categories of information must be tracked. Without an audit trail, unauthorized access to protected data could go undetected. To aid in d...
V-276256
LOWMEDIUMHIGH
Azure SQL Managed Instance must include additional, more detailed, organization-defined information in the audit records for audit events identified by type, location, or subject.Information system auditing capability is critical for accurate forensic analysis. Reconstruction of harmful events or forensic analysis is not possib...
V-276257
LOWMEDIUMHIGH
Azure SQL Managed Instance must generate audit records when attempts to delete security objects occur.The removal of security objects from the database/database management system (DBMS) would seriously degrade a system's information assurance posture. ...
V-276258
LOWMEDIUMHIGH
Azure SQL Managed Instance must generate audit records when attempts to delete categories of information (e.g., classification levels/security levels) occur.Changes in categorized information must be tracked. Without an audit trail, unauthorized access to protected data could go undetected. To aid in diagn...
V-276259
LOWMEDIUMHIGH
Azure SQL Managed Instance must generate audit records when logon or connection attempts occur.For completeness of forensic analysis, it is necessary to track failed attempts to log on to Azure SQL Managed Instance. While positive identification...
V-276260
LOWMEDIUMHIGH
Azure SQL Managed Instance must generate audit records for all privileged activities or other system-level access.Without tracking privileged activity, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify th...
V-276261
LOWMEDIUMHIGH
Azure SQL Managed Instance must generate audit records showing starting and ending time for user access to the database(s).For completeness of forensic analysis, it is necessary to know how long a user's (or other principal's) connection to the Azure SQL Managed Instance l...
V-276262
LOWMEDIUMHIGH
Azure SQL Managed Instance must generate audit records when concurrent logons/connections by the same user from different workstations occur.For completeness of forensic analysis, it is necessary to track who logs on to Azure SQL Managed Instance. Concurrent connections by the same user fro...
V-276263
LOWMEDIUMHIGH
Azure SQL Managed Instance must be able to generate audit records when access to objects occur.Without tracking all or selected types of access to all or selected objects (tables, views, procedures, functions, etc.), it would be difficult to est...
V-276264
LOWMEDIUMHIGH
Azure SQL Managed Instance must generate audit records for all direct access to the database(s).In this context, direct access is any query, command, or call to Azure SQL Managed Instance that comes from any source other than the application(s) i...
V-276265
LOWMEDIUMHIGH
Azure SQL Managed Instance must store audit records in an immutable blob storage container for an organizationally defined period of time.Information stored in one location is vulnerable to accidental or incidental deletion or alteration. When configured and enabled, Azure SQL Managed In...
V-276267
LOWMEDIUMHIGH
Azure SQL Managed Instance must implement the capability to centrally review and analyze audit records from multiple components within the system using a service such as Azure Log Analytics.Automated mechanisms for centralized reviews and analyses include Security Information and Event Management products....
V-276268
LOWMEDIUMHIGH
Azure SQL Server Managed Instance must alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information.Audit information includes all information needed to successfully audit system activity, such as audit records, audit log settings, audit reports, and...
V-276269
LOWMEDIUMHIGH
Azure SQL Managed Instance must prevent the installation of organization-defined software and firmware components without verification that the component has been digitally signed using a certificate recognized and approved by the organization.The database management system (DBMS) must prevent the installation of organization-defined software and firmware components without verification tha...
V-276276
LOWMEDIUMHIGH
Azure SQL Server Managed Instance must, for password-based authentication, require immediate selection of a new password upon account recovery.Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authentication. Long passwords ...
V-276285
LOWMEDIUMHIGH
Azure SQL Managed Instance must limit privileges to change software modules, to include stored procedures, functions, and triggers.If the system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate...
V-276286
LOWMEDIUMHIGH
Azure SQL Managed Instance must limit privileges to change software modules, to include schema ownership.If the system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate...
V-276287
LOWMEDIUMHIGH
The database master key (DMK) encryption password for Azure SQL Server Managed Instance must meet DOD password complexity requirements.Weak passwords may be easily guessed. When passwords are used to encrypt keys used for encryption of sensitive data, then the confidentiality of all d...
V-276288
LOWMEDIUMHIGH
The database master key (DMK) for Azure SQL Server Managed Instance must be encrypted by the service master key (SMK), where a DMK is required and another encryption method has not been specified.When not encrypted by the SMK, system administrators or application administrators may access and use the DMK to view sensitive data that they are not...
V-276289
LOWMEDIUMHIGH
The Certificate used for encryption for Azure SQL Managed Instance must be backed up, stored offline and off-site.Backup and recovery of the Certificate used for encryption is critical to the complete recovery of the database. Not having this key can lead to loss ...
V-276291
LOWMEDIUMHIGH
Azure SQL Managed Instance must check the validity of all data inputs except those specifically identified by the organization.Invalid user input occurs when a user inserts data or characters into an application's data entry fields and the application is unprepared to process ...
V-276294
LOWMEDIUMHIGH
Azure SQL Managed Instance must protect against a user falsely repudiating by ensuring databases are not in a trust relationship.Nonrepudiation of actions taken is required to maintain data integrity. Examples of particular actions taken by individuals include creating informati...
V-276295
LOWMEDIUMHIGH
Azure SQL Managed Instance must be configured to generate audit records for DOD-defined auditable events within all DBMS/database components.Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
V-276296
LOWMEDIUMHIGH
Azure SQL Managed Instance must allow only documented and approved individuals or roles to select which auditable events are to be audited.Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent or i...
V-276298
LOWMEDIUMHIGH
The audit information produced by Azure SQL Managed Instance must be protected from unauthorized access.If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity i...
V-276299
LOWMEDIUMHIGH
Azure SQL Managed Instance must protect its audit configuration from unauthorized access, modification, and deletion.Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data; therefore, protecting audit tools is ne...
V-276300
LOWMEDIUMHIGH
Access to xp_cmdshell must be disabled for Azure SQL Server Managed Instance unless specifically required and approved.Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, provided by default, may no...
V-276301
LOWMEDIUMHIGH
Access to CLR code must be disabled for Azure SQL Server Managed Instance, unless specifically required and approved.Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, provided by default, may no...
V-276302
LOWMEDIUMHIGH
Access to linked servers must be disabled or restricted for Azure SQL Server Managed Instance, unless specifically required and approved.Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, provided by default, may no...
V-276304
LOWMEDIUMHIGH
Azure SQL Server Managed Instance contained databases must use Microsoft Entra or native Windows principals.OS/enterprise authentication and identification must be used (SRG-APP-000023-DB-000001). Native DBMS authentication may be used only when circumstance...
V-276306
LOWMEDIUMHIGH
Azure SQL Managed Instance must reveal detailed error messages only to the information system security officer (ISSO), information system security manager (ISSM), system administrator (SA), and database administrator (DBA).If Azure SQL Managed Instance provides too much information in error logs and administrative messages to the screen, this could lead to compromise. Th...
V-276307
LOWMEDIUMHIGH
Azure SQL Managed Instance must prevent nonprivileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.Preventing nonprivileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary ...
V-276308
LOWMEDIUMHIGH
Azure SQL Managed Instance must enforce access restrictions associated with changes to the configuration of the instance.Failure to provide logical access restrictions associated with changes to configuration may have significant effects on the overall security of the sy...
V-276309
LOWMEDIUMHIGH
Azure Resource Manager must enforce access restrictions associated with changes to the configuration of Azure SQL Managed Instance.Failure to provide logical access restrictions associated with changes to configuration may have significant effects on the overall security of the sy...
V-276310
LOWMEDIUMHIGH
Azure SQL Managed Instance must produce audit records of its enforcement of access restrictions associated with changes to the configuration of Azure SQL Managed Instance or database(s).Without auditing the enforcement of access restrictions against changes to configuration, it would be difficult to identify attempted attacks and an a...
V-276311
LOWMEDIUMHIGH
Azure SQL Managed Instance must maintain a separate execution domain for each executing process.Database management systems can maintain separate execution domains for each executing process by assigning each process a separate address space. ...
V-276312
LOWMEDIUMHIGH
Azure SQL Managed Instance must be able to generate audit records when attempts to access security objects occur.Changes to the security configuration must be tracked. This requirement applies to situations where security data is retrieved or modified via data ...
V-276313
LOWMEDIUMHIGH
Azure SQL Managed Instance must generate audit records when attempts to access categorized information (e.g., classification levels/security levels) occur.Changes in categorized information must be tracked. Without an audit trail, unauthorized access to protected data could go undetected. For detailed...
V-276314
LOWMEDIUMHIGH
Azure SQL Managed Instance must generate audit records when attempts to add privileges/permissions occur.Changes in the permissions, privileges, and roles granted to users and roles must be tracked. Without an audit trail, unauthorized elevation or restri...
V-276315
LOWMEDIUMHIGH
Azure SQL Managed Instance must generate audit records when attempts to modify privileges/permissions occur.Changes in the permissions, privileges, and roles granted to users and roles must be tracked. Without an audit trail, unauthorized elevation or restri...
V-276316
LOWMEDIUMHIGH
Azure SQL Managed Instance must generate audit records when attempts to delete privileges/permissions occur.Changes in the permissions, privileges, and roles granted to users and roles must be tracked. Without an audit trail, unauthorized elevation or restri...
V-276317
LOWMEDIUMHIGH
The Azure SQL Managed Instance default [sa] account must be disabled.Azure SQL Managed Instance [sa] account has special privileges required to administer the database. The [sa] account is a well-known account and is li...
V-276318
LOWMEDIUMHIGH
Azure SQL Managed Instance default [sa] account must have its name changed.Azure SQL Managed Instance's [sa] account has special privileges required to administer the database. The [sa] account is a well-known account name th...
V-276319
LOWMEDIUMHIGH
The Allow Filesystem Enumeration feature must be disabled for Azure SQL Server Managed Instance, unless specifically required and approved.Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, provided by default, may no...
V-276320
LOWMEDIUMHIGH
The CLR Strict Security feature must be enabled for Azure SQL Server Managed Instance, unless specifically required and approved.Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, provided by default, may no...
V-276321
LOWMEDIUMHIGH
The Hadoop Connectivity feature must be disabled for Azure SQL Server Managed Instance, unless specifically required and approved.Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, provided by default, may no...
V-276322
LOWMEDIUMHIGH
Azure SQL Server Managed Instance Replication Xps feature must be disabled, unless specifically required and approved.Azure SQL Managed Instance is capable of providing a wide range of features and services. Some of the features and services, provided by default, may ...
V-276324
LOWMEDIUMHIGH
Applications connecting to Azure SQL Server Managed Instance must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.To prevent the compromise of authentication information, such as passwords and PINs, during the authentication process, the feedback from the informat...
V-276290
LOWMEDIUMHIGH
Azure SQL Managed Instance must isolate security functions from nonsecurity functions.An isolation boundary provides access control and protects the integrity of the hardware, software, and firmware that perform security functions. Se...
V-276297
LOWMEDIUMHIGH
Azure SQL Managed Instance must have an audit defined to track Microsoft Support Operations.Azure SQL Managed Instance auditing capability is critical for accurate forensic analysis. Reconstruction of harmful events or forensic analysis is no...
V-276225
LOWMEDIUMHIGH
Azure SQL Managed Instances must integrate with Microsoft Entra ID for providing account management and automation for all users, groups, roles, and any other principals.Enterprise environments make account management for applications and databases challenging and complex. A manual process for account management functi...
V-276226
LOWMEDIUMHIGH
Azure SQL Managed Instance must enforce approved authorizations for logical access to database information and system resources in accordance with applicable access control policies.Authentication with a DOD-approved PKI certificate does not necessarily imply authorization to access Azure SQL Managed Instance. To mitigate the risk...
V-276236
LOWMEDIUMHIGH
Azure SQL Managed Instance must use NSA-approved cryptography to protect classified information in accordance with the data owners' requirements.Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The application must implement cryptogr...
V-276251
LOWMEDIUMHIGH
Azure SQL Managed Instance must protect the confidentiality and integrity of all information at rest.This control is intended to address the confidentiality and integrity of information at rest in nonmobile devices and covers user information and syst...
V-276293
LOWMEDIUMHIGH
Azure SQL Managed Instance must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.Authentication with a DOD-approved PKI certificate does not necessarily imply authorization to access Azure SQL Managed Instance. To mitigate the risk...
V-276303
LOWMEDIUMHIGH
If DBMS authentication using passwords is employed, Azure SQL Managed Instance must enforce the DOD standards for password complexity and lifetime.OS/enterprise authentication and identification must be used (SRG-APP-000023-DB-000001). Native DBMS authentication may be used only when circumstance...
V-276305
LOWMEDIUMHIGH
If passwords are used for authentication, Azure SQL Server Managed Instance must transmit only encrypted representations of passwords.The DOD standard for authentication is DOD-approved PKI certificates. Authentication based on User ID and Password may be used only when it is not ...
V-276323
LOWMEDIUMHIGH
When using command-line tools with Azure SQL Server Managed Instance, such as SQLCMD, in a mixed-mode authentication environment, users must use a logon method that does not expose the password.To prevent the compromise of authentication information, such as passwords and PINs, during the authentication process, the feedback from the informat...