DoD STIGs – V-32469


Title: The DBMS must support organizational requirements to enforce password encryption for transmission.

Vulnerability ID: V-32469


IA Controls: None

Severity: medium

Description: Passwords need to be protected at all times and encryption is the standard method for protecting passwords during transmission.

DBMS passwords sent in clear text format across the network are vulnerable to discovery by unauthorized users. Disclosure of passwords may easily lead to unauthorized access to the database.

Check Text: Review configuration settings for encrypting passwords during login events across the network. If passwords are not encrypted, this is a finding.
If determined that passwords are passed unencrypted at any point along the transmission path between the source and destination, this is a finding.

Fix Text: Configure encryption for transmission of passwords across the network. If the database does not provide encryption for login events natively, employ encryption at the OS or network level.

Ensure passwords remain encrypted from source to destination.


Interpreting V-32469:

After SQL 2005 SQL Server automatically encrypted connection userIDs and passwords. If you are using a SQL 2005 or earlier system, you need to look into using SSL and TLS and forcing encryption over the network for any connections to the database.

The quickest and easiest way to ensure a minimal compliance is by enabling ‘force encryption’ on the protocols for SQL Server, accessed via the SQL Server Configuration Manager. This will implement a SQL Server generated self0signed certificate that will automatically push to clients using the native SQL Server drivers for connectivity.

Return to the DoD STIGs – Database Security Requirements Guide

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.