Check | Description |
---|---|
| Windows authentication is used to avoid credential management. |
| Connection strings are encrypted and encrypted data is stored securely, for example, in a restricted registry key. |
| OLE DB connection strings do not contain Persist Security Info="true" or "yes". |
| UDL files are secured with restricted ACLs. |