This build of IDERA SQL Secure includes many fixed issues, including the following previous updates.
2.8 New features
- SQL Secure now supports SQL Server 2014
- SQL Secure now supports Always On Availability Groups
- SQL Secure now allows you to install the SQL Secure Repository on a failover cluster. The installer provides an option to select Cluster installation and specify a cluster node.
- Policy Templates have been updated to use the latest versions of SQL Server and OS:
- Updated to policy templates:
- CIS v 2.0 for SQL Server 2005 (from version 1.2)
- PCI-DSS v 3.0 Guidelines for SQL Server (from version 2.0)
- HIPAA Guidelines for SQL Server - update security checks as needed e.g. Operating System Version
- Added templates for:
- CIS v1.1.0 for SQL Server 2008
- CIS v1.0.0 for SQL Server 2012
- MS Best Practices Analyzer for 2008
- MS Best Practices Analyzer for 2012
- Updated to policy templates:
- This version had updated to a granular process for Exporting and Importing policies, so that authorized SQL Logins can be excluded from exporting, and when imported the active settings for those checks remain unmodified.
- The process for registering new SQL Server instances with SQL Secure now allows to define folders for file system permissions checks.
- SQL Secure now supports Sequence Objects for SQL Server 2012.
- SQL Secure supports users in contained databases for SQL Server 2012 and 2014.
- SQL Secure now provides the following new Security Checks:
- Security Check for SQL Server Integration Services (SSIS) to verify if any public or other unauthorized principals have been granted permissions to use SSIS stored procedures.
- Security Check added to level 1 and level 2 policy templates that shows risk on systems where permissions have been granted to the public role on objects outside the sys schema in user databases.
- Security Check: Unacceptable Database Ownership detects if a database is found with an unacceptable owner
- The Risk Assessment Report has been updated with new nine security checks.
2.8 Fixed issues
Phase out SQL Secure Itanium support
IDERA is beginning to phase out all Itanium support in SQL Secure 2.6 and all subsequent 2.x versions. While 2.8 will continue to operate with Itanium and support is available, SQL Secure 3.0 will not support the Itanium processor architecture. For more information, see the product requirements.
SQL Secure Repository requires SQL Server 2005 or later
When upgrading, migrating, or deploying the SQL Secure Repository for the first time, ensure you select an instance running SQL Server 2005 or later for your target location. SQL Secure no longer supports SQL Server 2000 platform for the SQL Secure Repository.
If you are upgrading from SQL Secure version 2.0 or earlier , you will need to migrate the Repository to a SQL Server 2005 or later instance. For more information, see IDERA Solution 00002617 ("How do I migrate SQL Secure from one server to another?").
Microsoft Reporting Services 2000 is no longer supported
If you are upgrading reports from Microsoft Reporting Services 2000 , then upgrade to Microsoft Reporting Services 2005 before installing the new reports in SQL Secure 2.8 to ensure the upgrade is successful.
New credentials may be necessary when upgrading
SQL Secure no longer uses the default credentials of your SQL Server Agent to collect Operating System and SQL Server security information. If, in a previously installed version, SQL Secure was configured to use the default SQL Agent credentials to collect security information, a window will open when you first open SQL Secure 2.8, prompting you for new credentials.
Blank password not accepted when registering a SQL Server instance
When registering a new SQL Server instance, blank passwords are not accepted for SQL logins due to the extreme security risk this poses.
SQL Secure can now audit the same cluster node on which it is installed
The SQL Secure now allows you to audit security data from SQL Server instances hosted on the same cluster node that hosts the SQL Secure Collector.
Support for contained database authentication security
SQL Secure now displays information and report on the security settings of database principals used for contained database authentication and connections. Contained databases are a new security feature available in SQL Server 2012.
SQL Secure now collects security data for AlwaysOn Availability Groups
When you take snapshots of the SQL Server 2012 instances you audit, SQL Secure now collects properties or security data for the AlwaysOn Availability Groups feature. AlwaysOn can be enabled only on instances running SQL Server 2012 & 2014 Enterprise Edition.
2.7 New features
New policy templates for PCI and HIPAA
The SQL Secure policy templates now address security standards for the Payment Card Industry (PCI) and the Health Insurance Portability and Accountability Act (HIPAA), allowing you to immediately begin accessing your SQL Server environment against these regulations.
New weak password detection
SQL Secure now detects and analyses the password health of SQL logins on your audited SQL Server instances, reporting when passwords are blank or weak.
New security checks
SQL Secure now provides these additional security checks to help you further harden the security of your SQL Server instances:
- Weak Passwords
- Public Role Has Permissions on Database User Objects
- Integration Services Roles Have Dangerous Security Principals
- Integration Services Permissions Not Acceptable
- These security checks are enabled in the IDERA Level 3 policy template.
New FIPS support
SQL Secure now supports auditing and assessing the security of SQL Server instances located in environments that require FIPS compliance.
New SQL Server 2012 support
SQL Secure now offers full support of SQL Server 2012 RTM.
2.7 Fixed issues
- When changing server connection credentials, SQL Secure now identifies other audited SQL Server instances that use the same account and then lets you change their connection credentials as well.
- SQL Secure now correctly processes local account information for SQL Server instances operating in clustered environments.
- Snapshots that have been marked as baselines are no longer deleted from the SQL Secure Repository database during grooming.
- The SQL Secure Collector now correctly gets file permissions for service executable files when the file name is specified in upper case.
- The SQL Secure Collector now correctly gets permissions data for system databases that are not located on the local drive of the target SQL Server instance.
- SQL Secure now successfully displays the Server Security Report Card and generates the Risk Assessment report when the audited SQL Server instance and the instance hosting the SQL Secure Repository have been assigned different collations.
- When scheduling monthly snapshots, SQL Secure now correctly applies the "3rd," "4th," and "Last" options for specific days of the month.
2.6 New features
SQL Secure 2.6 includes the following fixed issues.
- SQL Secure is now correctly collects database file permissions when the SQL Server files are located in the root directory of a drive.
- The SQL Secure Common TCP Port security check will now generate a finding if a SQL Server instance is using dynamic ports only when "dynamic" is entered in the configuration list. Previously, dynamic ports would always generate a finding.
- The Full-Text Search Login Account Not Acceptable security check now correctly checks on and reports findings for all Full Text Search service logins on your audited SQL Server instances.
- SQL Secure now correctly collects file permissions from audited SQL Server instances hosted by a clustered Windows 2008 Server computer.