Rule ID
SV-213770r960960_rule
Version
V1R7
CCIs
Within the database, object ownership implies full privileges to the owned object, including the privilege to assign access to the owned objects to other subjects. Database functions and procedures can be coded using definer's rights. This allows anyone who utilizes the object to perform the actions if they were the owner. If not properly managed, this can lead to privileged actions being taken by unauthorized individuals. Conversely, if critical tables or other objects rely on unauthorized owner accounts, these objects may be lost when an account is removed.
Review system documentation to identify SQL Server accounts authorized to own database objects.
If the SQL Server database ownership list does not exist or needs to be updated, this is a finding.
The view STIG.database_permissions, included in the supplemental file, Permissions.sql, can be of use in making this determination:
USE <database name>;
GO
SELECT DISTINCT
S.[Schema/Owner] AS [Owner],
O.[Schema/Owner] AS [Schema],
O.[Securable]
FROM
STIG.database_permissions O
INNER JOIN STIG.database_permissions S
ON S.[Securable] = O.[Schema/Owner]
AND O.[Securable Type or Class] = 'OBJECT_OR_COLUMN'
AND S.[Securable Type or Class] = 'SCHEMA'
WHERE
S.[Schema/Owner] NOT IN ('dbo', 'sys', 'INFORMATION_SCHEMA' ... )
-- Complete the "NOT IN" list with the names of user accounts authorized for ownership.
;
If any of the listed owners is not authorized, this is a finding.Add and/or update system documentation to include any accounts authorized for object ownership and remove any account not authorized. To change the schema owning a database object in SQL Server, use this code: USE <database name>; GO ALTER SCHEMA <name of new schema> TRANSFER <name of old schema>.<object name>; GO Caution: this can break code. This Fix should be implemented in conjunction with corrections to such code. Test before deploying in production. Deploy during a scheduled maintenance window.