Skip to content

Commit dd723cf

Browse files
committed
Adding VA Rules article
1 parent 803e75b commit dd723cf

File tree

1 file changed

+27
-0
lines changed

1 file changed

+27
-0
lines changed
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
---
2+
title: SQL Vulnerability Assessment rules reference guide
3+
description: "List of rule titles and descriptions"
4+
services: sql-database
5+
ms.service: sql-database
6+
ms.subservice: security
7+
ms.topic: conceptual
8+
author: VanMSFT
9+
ms.author: vanto
10+
ms.reviewer: vanto
11+
ms.date: 04/06/2020
12+
---
13+
14+
# SQL Vulnerability Assessment rules reference guide
15+
16+
This article lists the set of built-in rules that are used to flag security vulnerabilities and highlight deviations from best practices, such as misconfigurations, excessive permissions, and unprotected sensitive data. The rules are based on Microsoft’s best practices and focus on the security issues that present the biggest risks to your database and its valuable data. They cover both database-level issues as well as server-level security issues, like server firewall settings and server-level permissions. These rules also represent many of the requirements from various regulatory bodies to meet their compliance standards.
17+
18+
The rules shown in your database scans depend on the SQL version and platform that was scanned.
19+
20+
To learn about how to implement Vulnerability Assessment on SQL Databases see [Implement Vulnerability Assessment](https://docs.microsoft.com/azure/sql-database/sql-vulnerability-assessment#implementing-vulnerability-assessment).
21+
22+
23+
>[!div class="mx-tdBreakAll"]
24+
>|Rule Id |Rule Title |Rule Category |Rule Severity |Rule Description |Platform |
25+
>|---------|---------|---------|---------|---------|---------|
26+
>|VA1017 |Execute permissions on xp_cmdshell from all users (except dbo) should be revoked |AuthenticationAndAuthorization |High |The xp_cmdshell extended stored procedure spawns a Windows command shell |SQL server 2012 and above |
27+
>|VA1018 |Latest updates should be installed |InstallationUpdatesAndPatches |High |Microsoft periodically releases Cumulative Updates (CUs) for each version of SQL Server. This rule checks whether the latest CU has been installed for the particular version of SQL Server being used, by passing in a string for execution. This rule checks that all users (except dbo) do not have permission to execute the xp_cmdshell extended stored procedure. |SQL Server 2005</br>SQL Server 2008</br>SQL Server 2008R2</br>SQL Server 2012</br>SQL Server 2014</br>SQL Server 2016</br>SQL Server 2017</br>|

0 commit comments

Comments
 (0)