SQL Server Hardening Considerations
Top SQL Hardening Considerations
Top SQL Hardening considerations:
-
Do not install SQL Server on an Active Directory Domain Controller.
-
Install the latest cumulative update for SQL Server from Microsoft site: https://www.microsoft.com/en-us/download/details.aspx?id=56128.
-
Set a strong password for the sa account before installing ICM.
-
Always install SQL Server service to run using a least privilege account. Never install SQL Server to run using the built-in Local System account. Instead, use the Virtual account.
See the Staging Guide for Cisco Unified ICM/Contact Center Enterprise at https://www.cisco.com/c/en/us/support/customer-collaboration/unified-contact-center-enterprise/products-installation-guides-list.html for more information.
-
Enable SQL Server Agent Service and set to Automatic for database maintenance in Unified ICM.

Note
Installing the latest cumulative update for SQL Server from Microsoft might require you to disable the SQL Server Agent service. So before performing the cumulative update installation, reset this service to disabled. When the installation is complete, stop the service and set it back to enabled.
-
Disable the SQL guest account.
-
Restrict sysadmin membership to your Unified ICM administrators.
-
Block TCP port 1433 and UDP port 1434 at the network firewall, unless the Administration & Data Server is not in the same security zone as the Logger.
-
Change the recovery actions of the Microsoft SQL Server service to restart after a failure.
-
Remove all sample databases.
-
Enable auditing for failed sign-ins.
The following table lists the settings and the corresponding default and supported values for SQL hardening.
|
Setting Name |
Default Value |
Supported Value |
|---|---|---|
|
Scan for Startup Procedures |
Disabled |0| |
0 or 1 supported. Unified CCE does not require it to be enabled; however, enabling it would not create any problem. |
|
Ad Hoc Distributed Queries |
Disabled |0| |
0 or 1 supported. 0 is more secure. |
SQL Server Users and Authentication
When creating a user for the SQL Server account, create Windows accounts with the lowest possible privileges for running SQL Server services. Create the accounts during the installation of SQL Server.
During installation, SQL Server Database Engine is set to either Windows Authentication mode or SQL Server and Windows Authentication mode. If Windows Authentication mode is selected during installation, the sa login is disabled. If you later change authentication mode to SQL Server and Windows Authentication mode, the sa login remains disabled. To enable the sa login, use the ALTER LOGIN statement. For more details, see https://msdn.microsoft.com/en-us/library/ms188670.aspx.
The local user or the domain user account that is created for the SQL Server service account follows the Windows or domain password policy respectively. Apply a strict password policy on this account. However, do not set the password to expire. If the password expires, the SQL Server service ceases to function and the Administration & Data Server fails.
Site requirements can govern the password and account settings. Consider minimum settings like the following:
|
Setting |
Value |
|---|---|
|
Enforce Password History |
24 passwords remembered |
|
Minimum Password Length |
12 characters |
|
Password Complexity |
Enabled |
|
Minimum Password Age |
1 day |
|
Account Lockout Duration |
15 minutes |
|
Account Lockout Threshold |
3 invalid logon attempts |
|
Reset Account Lockout Counter After |
15 minutes |
Mixed mode authentication is enforced through SQL Server automated hardening.
During automated SQL Server hardening, if the sa password is found as blank, a randomly generated strong password is generated so as to secure the sa account.
You can reset the sa account password after installation by logging on to the SQL Server using a Windows Local Administrator account.
Feedback