Medium

Available on

Apple Android Windows

Database Engine Security Checklist: Limit Access to Data (Australia) Mobile App

This simple checklist app helps you review how you limit access to data in your organisation. Use this checklist as a periodic audit to insure your policy is current and being executed appropriately.

  • Lendlease
  • The Cooperative
  • PG&E
  • Red Bull
  • Mirvac

Want to learn more about GoCanvas?

Request a Demo

Take a peek inside the Database Engine Security Checklist: Limit Access to Data (Australia) Mobile App

Included Features

Our App Builder gives you the power to easily add and remove the ones you want. {{controller.show_all ? 'See included features.' : 'See more features.'}}

  • {{data.title}}

Included Fields

Customize to add, remove, or edit any of the fields below.

  • Ico date

    Date

  • Ico textbox

    Person completing audit

  • Ico textbox

    Job role

  • Ico checkbox

    Have you granted access through Windows groups for most logins?

  • Ico checkbox

    Have you removed unnecessary or obsolete logins from the Database Engine?

  • Ico checkbox

    Have you implemented the principle of least privilege?

  • Ico checkbox

    To view system metadata without conferring additional permissions, have you granted the VIEW DEFI...

  • Ico checkbox

    Have you replaced remote servers with linked servers?

  • Ico checkbox

    If pass-through authentication to a linked server is necessary have you constrained delegation?

  • Ico checkbox

    Have you disabled ad hoc queries through servers (unless needed)?

  • Ico multiline

    Comments

  • Ico checkbox

    Is the guest user account disabled in every database unless required for anonymous users?

  • Ico checkbox

    Do users only have access to necessary databases?

  • Ico checkbox

    Have most users been granted access through SQL Server roles?

  • Ico checkbox

    than adjusting the privileges of the SQL Server Agent service account?

  • Ico checkbox

    If a SQL Server Agent user needs to execute a job that requires different Windows credentials, ha...

  • Ico checkbox

    triggers, or assemblies?

  • Ico checkbox

    In modules, have you explicitly set an execution context rather than using the default context?

  • Ico checkbox

    Are modules signed to inhibit tampering?

  • Ico checkbox

    Do you use USER WITHOUT LOGIN instead of application roles?

  • Ico checkbox

    Do you use EXECUTE AS instead of SETUSER?

  • Ico checkbox

    Have you replaced application roles with EXECUTE AS?

  • Ico multiline

    Comments

  • Ico checkbox

    Are the public server and database roles granted few (if any) permissions?

  • Ico checkbox

    Are similar database objects grouped together into the same schema?

  • Ico checkbox

    Do you manage database object security by setting ownership and permissions at the schema level?

  • Ico checkbox

    Do you have distinct owners for schemas instead of having all schemas owned by dbo?

  • Ico checkbox

    Do you use code signing of procedural code if additional privileges are required for the procedure?

  • ...and More!

Related Other Services Apps... and they're all free for GoCanvas subscribers!

App Name

Due Diligence Checklist

The Due Diligence Checklist mobile app facilitates the inspection of financial institutions when it comes to ensuring due ...

App Name

Security Camera Installation Checklist

The Security Camera Installation Checklist Mobile App helps ensure the proper installation of security camera systems, sur...

App Name

Retail/Convenience Store Security: E...

After assessing violence hazards, the next step is to develop measures to protect employees from the identified risks of i...

App Name

Healthcare Surge: Disaster Incident N...

Use Healthcare Surge: Disaster Incident Number Policy and Label mobile app to when a disaster incident number required. It...

App Name

Bank Audit Security Program

The Bank Audit Security Program mobile app takes bank security auditing to a new level. Instead of using paper forms to au...

App Name

Security Audit: Key Control and Lock ...

The Security Audit: Key Control and Lock Security mobile app is part of a security assessment to ensure that access contro...

App Name

Arrest and Conviction Form

Use the Arrest and Conviction Form mobile app to complete questionnaire pertaining to each arrest, indictment and/or convi...

App Name

Healthcare Surge: Hospital Patient Va...

In the event a patient must store valuables with the hospital for safekeeping, a designated hospital staff member should i...

More Information