Solved

SQL 2012 STIGS

Posted on 2014-12-18
3
82 Views
Last Modified: 2015-12-30
I wanted to know if anyone has existing scripts that lockdown a 2012 SQL server with 2012 STIGS?
0
Comment
Question by:sarafara1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 64

Accepted Solution

by:
btan earned 500 total points
ID: 40508623
The more  easier approach is using various means of script since various SQL components are involved and manual verification rather than one script as to lockdown specific to the STIG or any other benchmark. It is not straightforward, to align just to a standard and required some manual mapping on script lockdown and field of interest to STIG. Here is one good reference covering various component which I believe can be fulfiling the lockdown though not necessarily all STIG req. e.g. http://www.derekseaman.com/2010/07/automate-and-secure-your-sql-2008-r2.html

Consider using MS SQL has  best practice analyser https://labs.portcullis.co.uk/blog/ms-sql-server-audit-introduction/ that listed various areas but most of the surfaced area may not necessary be script easily.
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you s…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question