STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Microsoft SQL Server 2022 Instance Security Technical Implementation Guide

V-274445

CAT II (Medium)

The SQL Server default account [sa] must have its name changed.

Rule ID

SV-274445r1111103_rule

STIG

Microsoft SQL Server 2022 Instance Security Technical Implementation Guide

Version

V1R4

CCIs

CCI-000381

Discussion

SQL Server's [sa] account has special privileges required to administer the database. The [sa] account is a well-known SQL Server account name and is likely to be targeted by attackers, and is thus more prone to providing unauthorized access to the database. Since the SQL Server [sa] is administrative in nature, the compromise of a default account can have catastrophic consequences, including the complete loss of control over SQL Server. Since SQL Server needs for this account to exist and it should not be removed, one way to mitigate this risk is to change the [sa] account name.

Check Content

Verify the SQL Server default [sa] (system administrator) account name has been changed by executing the following query:
USE master; 
GO 
SELECT * 
FROM sys.sql_logins 
WHERE [name] = 'sa' OR [principal_id] = 1; 
GO 

If the login account name "SA" or "sa" appears in the query output, this is a finding.

Fix Text

Modify the SQL Server's [sa] (system administrator) account by running the following script:

USE master; 
GO 
ALTER LOGIN [sa] WITH NAME = <new name> 
GO