Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
This checklist reviews key options to use when connecting to the SQL Server Database Engine. Use this checklist to review your environment to make sure that connections are made to the Database Engine as securely as necessary for your business needs.
Database Engine Configuration
... |
Description |
|
Is the Database Engine configured to listen on the required protocols and no others? |
|
Are Service Broker, HTTP, and database-mirroring endpoints only created if necessary? |
|
Are connections made using Windows Authentication whenever possible? |
|
Is the Database Engine configured to use a certificate from a trusted authority to secure communications? |
|
Is SQL Server configured to allow only secure connections over the network? |
|
When possible, is SQL Server using Kerberos authentication for Windows Authentication clients? |
|
On Windows Server 2003 and Windows XP, is the Database Engine running under a domain account that is not used by any other service? |
|
If the Database Engine is running under a domain account, is the password of the account changed on a regular basis? |
|
Are named instances of the Database Engine configured to listen on a fixed port? |
|
Did you configure login auditing to retain a record of failed logins? |
|
Have you configured SQL Server audit to audit failed logins? |
|
Have you removed unnecessary or obsolete logins from the Database Engine? |
Client Settings
... |
Description |
|
Are clients configured to only connect using Secured Sockets Layer (SSL)? |
|
Are clients configured to connect using accounts with the least privilege necessary for the business need? |
|
Do administrators connect using Windows logins instead of the sa account? |
|
Do administrators connect using lesser privileged accounts when not performing administrative actions? |
Operating System Settings
... |
Description |
|
Is the SQL Server computer protected by a firewall with only the necessary exceptions? |
|
Are the server and client operating systems configured to use Extended Protection for Authentication? |
Other Checklists
Database Engine Security Checklist: Database Engine Security Configuration
Database Engine Security Checklist: Limiting Access to Data
Database Engine Security Checklist: Encrypting Sensitive Data