Medium

Available on

Apple Android Windows

Database Engine Security Checklist: Limit Access to Data (Australia) Mobile App

This simple checklist app helps you review how you limit access to data in your organisation. Use this checklist as a periodic audit to insure your policy is current and being executed appropriately.

  • Lendlease
  • The Cooperative
  • PG&E
  • Red Bull
  • Mirvac

Want to learn more about GoCanvas?

Request a Demo

Take a peek inside the Database Engine Security Checklist: Limit Access to Data (Australia) Mobile App

Included Features

Our App Builder gives you the power to easily add and remove the ones you want. {{controller.show_all ? 'See included features.' : 'See more features.'}}

  • {{data.title}}

Included Fields

Customize to add, remove, or edit any of the fields below.

  • Ico date

    Date

  • Ico textbox

    Person completing audit

  • Ico textbox

    Job role

  • Ico checkbox

    Have you granted access through Windows groups for most logins?

  • Ico checkbox

    Have you removed unnecessary or obsolete logins from the Database Engine?

  • Ico checkbox

    Have you implemented the principle of least privilege?

  • Ico checkbox

    To view system metadata without conferring additional permissions, have you granted the VIEW DEFI...

  • Ico checkbox

    Have you replaced remote servers with linked servers?

  • Ico checkbox

    If pass-through authentication to a linked server is necessary have you constrained delegation?

  • Ico checkbox

    Have you disabled ad hoc queries through servers (unless needed)?

  • Ico multiline

    Comments

  • Ico checkbox

    Is the guest user account disabled in every database unless required for anonymous users?

  • Ico checkbox

    Do users only have access to necessary databases?

  • Ico checkbox

    Have most users been granted access through SQL Server roles?

  • Ico checkbox

    than adjusting the privileges of the SQL Server Agent service account?

  • Ico checkbox

    If a SQL Server Agent user needs to execute a job that requires different Windows credentials, ha...

  • Ico checkbox

    triggers, or assemblies?

  • Ico checkbox

    In modules, have you explicitly set an execution context rather than using the default context?

  • Ico checkbox

    Are modules signed to inhibit tampering?

  • Ico checkbox

    Do you use USER WITHOUT LOGIN instead of application roles?

  • Ico checkbox

    Do you use EXECUTE AS instead of SETUSER?

  • Ico checkbox

    Have you replaced application roles with EXECUTE AS?

  • Ico multiline

    Comments

  • Ico checkbox

    Are the public server and database roles granted few (if any) permissions?

  • Ico checkbox

    Are similar database objects grouped together into the same schema?

  • Ico checkbox

    Do you manage database object security by setting ownership and permissions at the schema level?

  • Ico checkbox

    Do you have distinct owners for schemas instead of having all schemas owned by dbo?

  • Ico checkbox

    Do you use code signing of procedural code if additional privileges are required for the procedure?

  • ...and More!

Related Other Services Apps... and they're all free for GoCanvas subscribers!

App Name

BID Street Level Conditions

Any property owners who are part of a Business Improvement District (BID) want to ensure that their investment in the nei...

App Name

Security Audit: Policies and Program

The Security Audit: Policies and Programs mobile app is part of a security assessment. The app can be completed as a self ...

App Name

Healthcare Surge: Standardized Securi...

Without proper safety and security measures at a healthcare facility, the lives of patients and personnel will be in jeopa...

App Name

HIPAA Patient Request Access to PHI T...

Tip sheet that includes information on how to use the form, relevant HIPAA definition, penalties for noncompliance, helpfu...

App Name

Office Security Checklist Assessment

Whether your office is located in a high-rise building or a medical facility, all workplaces should be inspected for offic...

App Name

Security Audit: Interior Physical Cha...

The Security Audit: Interior Physical Characteristics mobile app is part of a security assessment. The app can be complete...

App Name

Hospital Elderly Preparedness Checklist

The Hospital Elderly Preparedness Checklist mobile app was developed for facilities that care and treat the elderly popula...

App Name

HIPAA Response to Patient Request to ...

Tip sheet that includes information on how to use the form, relevant HIPAA definition, penalties for noncompliance, helpfu...

More Information