Title: The DBMS must support organizational requirements to enforce password encryption for transmission.
Vulnerability ID: V-32469
IA Controls: None
Description: Passwords need to be protected at all times and encryption is the standard method for protecting passwords during transmission.
DBMS passwords sent in clear text format across the network are vulnerable to discovery by unauthorized users. Disclosure of passwords may easily lead to unauthorized access to the database.
Check Text: Review configuration settings for encrypting passwords during login events across the network. If passwords are not encrypted, this is a finding.
If determined that passwords are passed unencrypted at any point along the transmission path between the source and destination, this is a finding.
Fix Text: Configure encryption for transmission of passwords across the network. If the database does not provide encryption for login events natively, employ encryption at the OS or network level.
Ensure passwords remain encrypted from source to destination.[divider]
After SQL 2005 SQL Server automatically encrypted connection userIDs and passwords. If you are using a SQL 2005 or earlier system, you need to look into using SSL and TLS and forcing encryption over the network for any connections to the database.
The quickest and easiest way to ensure a minimal compliance is by enabling ‘force encryption’ on the protocols for SQL Server, accessed via the SQL Server Configuration Manager. This will implement a SQL Server generated self0signed certificate that will automatically push to clients using the native SQL Server drivers for connectivity.