Back
🔒
Microsoft SQL Server 2022 Database STIG Checklist
Medium
12 items
·
2 hours
testuser
Published 1 month ago
A practical checklist for database-level security controls in Microsoft SQL Server 2022 following STIG guidance. Suited for DBAs and security staff to secure databases, data-at-rest, access, and auditing.
Progress
0 / 12
- Inventory all databases and document owners — List names, sizes, owners, and intended purpose.
- Remove sample and demo databases from production — Delete AdventureWorks and test DBs from production hosts.
- Enable Transparent Data Encryption (TDE) or equivalent — Protect data at rest using TDE or approved encryption.
- Encrypt database backups and verify key management — Ensure backup encryption and secure key/certificate storage.
- Implement role-based access control and minimize db_owner use — Use roles for common permissions instead of broad rights.
- Review and remove unused logins, users, and orphaned accounts
- Restrict and audit elevated database permissions — Limit EXECUTE and ALTER on critical objects to needed roles.
- Disable or review CLR, xp_cmdshell, and unsafe assemblies
- Enable database-level auditing for privileged actions — Capture schema changes, permission grants, and role changes.
- Schedule and run DBCC CHECKDB integrity checks regularly — Detect corruption early and document remediation steps.
- Secure database files and folders with NTFS permissions — Limit OS-level access to SQL Server service accounts only.
- Test database restores and verify data integrity and access — Perform restore drills and verify decryption and permissions.
Your Stats
🏆
0
Completed
📅
—
Last Done
⏱️
—
Last Time
Completion Rate
Items checked per run
⚡
—
Fastest Run
🔥
0
Streak
🚫
—
Most Skipped Step
🔄
0
Resets
📝 My Notes