DoD STIGs – V-32478


Title: The DBMS must ensure that PKI-based authentication maps the authenticated identity to the user account.

Vulnerability ID: V-32478


IA Controls: None

Severity: medium

Description: The cornerstone of the PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptographic value that does not contain specific user information.

When including the DBMS in the Private Key Infrastructure, the authenticated user must map directly to a user account in the DBMS. If the user account is not directly tied to the authenticated identity there is no way to know which, if any, database user account has been authorized.

Check Text: Review DBMS configuration to verify DBMS user accounts are being mapped directly to authenticated identity information being passed via the PKI. If user accounts are not being mapped to authenticated identity information being passed via the PKI, this is a finding.

Fix Text: Configure the DBMS to map the authenticated identity directly to the DBMS user account.


Interpreting V-32478:

Public Key Cryptography (PKI) is a form of message secrecy in which a user creates a public key and a private key. The private key is kept secret, whereas the public key can be distributed to others. Although the keys are mathematically related, the private key cannot be easily derived by using the public key. The public key is used to encrypt data and the private key is used to decrypt data. A message that is encrypted by using the public key can only be decrypted by using the correct private key.

In SQL Server Network Authenticated logins are mapped to specific accounts and groups on the network. Permissions and PKI are passed through to SQL Server ensuring that the authentication is mapped correctly.


Return to the DoD STIGs – Database Security Requirements Guide

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.