EDB Postgres Advanced Server Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 1
Comparison against the immediately-prior release (V1R6). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 1
- V-69001 Medium descriptioncheck The EDB Postgres Advanced Server must provide an immediate real-time alert to appropriate support staff of all audit log failures.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- PPS9-00-000100
- Vuln IDs
-
- V-68875
- Rule IDs
-
- SV-83479r1_rule
Checks: C-69345r1_chk
Determine whether the system documentation specifies limits on the number of concurrent DBMS sessions per account by type of user. If it does not, assume a limit of 10 for database administrators and 2 for all other users. Execute the following SQL as enterprisedb: SELECT rolname, rolconnlimit FROM pg_roles; If rolconnlimit is -1 or larger than the system documentation limits for any rolname, this is a finding.
Fix: F-75057r1_fix
Execute the following SQL as enterprisedb: SELECT rolname, rolconnlimit FROM pg_roles; For any roles where rolconnlimit is -1 or larger than the system documentation limits, execute this SQL as enterprisedb:. ALTER USER <role> WITH CONNECTION LIMIT <desired connection limit>;
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- PPS9-00-000700
- Vuln IDs
-
- V-68877
- Rule IDs
-
- SV-83481r1_rule
Checks: C-69347r1_chk
Verify that pg_hba.conf is not using: “trust”, “md5”, or “password” as allowable access methods. > cat <postgresql data directory>/pg_hba.conf | egrep –I ‘(trust|md5|password)’ | grep –v ‘#’ If any output is produced, verify the users are documented as being authorized to use one of these access methods. If the users are not authorized to use these access methods, this is a finding. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
Fix: F-75059r1_fix
Identify any user that is using “trust”, “md5”, or “password” as allowable access methods. > cat <postgresql data directory>/pg_hba.conf | egrep –I ‘(trust|md5|password)’ | grep –v ‘#’ Document any rows that have "trust", "md5", or "password" specified for the "METHOD" column and obtain appropriate approval for each user specified in the "USER" column (i.e., all DBMS managed accounts). For any users that are not documented and approved as DBMS managed accounts, change the "METHOD" column to one of the externally managed (not "trust", "md5", or "password") options defined here: http://www.postgresql.org/docs/9.5/static/auth-methods.html (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- PPS9-00-000800
- Vuln IDs
-
- V-68879
- Rule IDs
-
- SV-83483r1_rule
Checks: C-69349r1_chk
Review the system documentation to determine the required levels of protection for DBMS server securables by type of login. Review the permissions actually in place on the server. If the actual permissions do not match the documented requirements, this is a finding.
Fix: F-75061r1_fix
Use GRANT, REVOKE, ALTER statements to add and remove permissions on server-level securables, bringing them into line with the documented requirements.
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- PPS9-00-000900
- Vuln IDs
-
- V-68881
- Rule IDs
-
- SV-83485r1_rule
Checks: C-69351r1_chk
Execute the following SQL as enterprisedb: SHOW edb_audit; If the result is not "csv" or "xml", this is a finding.
Fix: F-75063r1_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit = csv; SELECT pg_reload_conf(); or ALTER SYSTEM SET edb_audit = xml; SELECT pg_reload_conf();
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- PPS9-00-001000
- Vuln IDs
-
- V-68883
- Rule IDs
-
- SV-83487r1_rule
Checks: C-69353r1_chk
Execute the following SQL as enterprisedb: SHOW edb_audit; If the result is not "csv" or "xml", this is a finding.
Fix: F-75065r1_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit = csv; SELECT pg_reload_conf(); or ALTER SYSTEM SET edb_audit = xml; SELECT pg_reload_conf();
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000171
- Version
- PPS9-00-001100
- Vuln IDs
-
- V-68885
- Rule IDs
-
- SV-83489r1_rule
Checks: C-69355r1_chk
Run the command "ls -al <postgresql data directory>/postgresql*.conf" to show file permissions. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) If the files are not owned by enterprisedb(user)/enterprisedb(group) or does not have RW permission for the user only, this is a finding.
Fix: F-75067r1_fix
Run these commands: 1) "chown enterprisedb <postgresql data directory>/postgresql*.conf" 2) "chgrp enterprisedb <postgresql data directory>/postgresql*.conf" 3) "chmod 600 <postgresql data directory>/postgresql*.conf" (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-001200
- Vuln IDs
-
- V-68887
- Rule IDs
-
- SV-83491r2_rule
Checks: C-69357r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75069r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-001300
- Vuln IDs
-
- V-68889
- Rule IDs
-
- SV-83493r2_rule
Checks: C-69359r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75071r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- PPS9-00-001400
- Vuln IDs
-
- V-68891
- Rule IDs
-
- SV-83495r2_rule
Checks: C-69361r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75073r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- PPS9-00-001600
- Vuln IDs
-
- V-68895
- Rule IDs
-
- SV-83499r2_rule
Checks: C-69365r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75077r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- PPS9-00-001700
- Vuln IDs
-
- V-68897
- Rule IDs
-
- SV-83501r2_rule
Checks: C-69367r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75079r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- PPS9-00-001800
- Vuln IDs
-
- V-68899
- Rule IDs
-
- SV-83503r2_rule
Checks: C-69369r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75081r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- PPS9-00-001900
- Vuln IDs
-
- V-68901
- Rule IDs
-
- SV-83505r2_rule
Checks: C-69371r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75083r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- PPS9-00-002000
- Vuln IDs
-
- V-68903
- Rule IDs
-
- SV-83507r2_rule
Checks: C-69373r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75085r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- PPS9-00-002100
- Vuln IDs
-
- V-68905
- Rule IDs
-
- SV-83509r2_rule
Checks: C-69375r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75087r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- PPS9-00-002200
- Vuln IDs
-
- V-68907
- Rule IDs
-
- SV-83511r1_rule
Checks: C-69377r1_chk
Review the system documentation to identify what additional information the organization has determined necessary. Check application and database design, and existing audit records to verify that all organization-defined additional, more detailed information is in the audit records for audit events identified by type, location, or subject. If any additional information is defined and is not included in the audit records, this is a finding.
Fix: F-75089r1_fix
Execute the following SQL to set additional detailed information for the audit records in the session: set edb_audit_tag = '<information>'; Replace <information> with a character string holding the additional data that must be captured. To set this in a trigger, an example is included below. Keep in mind that the edb_audit_tag is set for the life of the session, not just the life of the insert command: CREATE OR REPLACE FUNCTION add_audit_info() RETURNS trigger AS $BODY$ BEGIN SET edb_audit_tag = '<information>'; RETURN NEW; END; $BODY$ LANGUAGE plpgsql; CREATE TRIGGER add_audit_info_trigger BEFORE INSERT ON <table> FOR EACH ROW EXECUTE PROCEDURE add_audit_info();
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- PPS9-00-002300
- Vuln IDs
-
- V-68909
- Rule IDs
-
- SV-83513r1_rule
Checks: C-69379r1_chk
If Postgres Enterprise Manager (PEM) is not installed and configured to shut down the database when the audit log is full, this is a finding.
Fix: F-75091r1_fix
Install PEM and configure an alert to shut down the PPAS server when the audit log mount point is at 99 percent full. Refer to the Supplemental Procedures document, supplied with this STIG, for guidance on configuring alerts.
- RMF Control
- AU-5
- Severity
- H
- CCI
- CCI-000140
- Version
- PPS9-00-002400
- Vuln IDs
-
- V-68911
- Rule IDs
-
- SV-83515r1_rule
Checks: C-69381r1_chk
If an externally managed and monitored partition or logical volume that can be grown dynamically is being used for logging, this is not a finding. If PPAS is auditing to a directory that is not being actively checked for availability of disk space, and if logrotate is not configured to rotate logs based on the size of the audit log directory with oldest logs being replaced by newest logs, this is a finding.
Fix: F-75093r1_fix
Determine the max size of your audit log directory. For this fix, we will assume that the audit log directory has a max size of 100MB. Divide the max size of the directory by 10 to determine the size of your log files for rotation. Perform the following steps to ensure that the audit log directory is never more than 90% full and new logs always replace the oldest logs: 1) Add the following to the bottom of the /etc/logrotate.conf file: <postgresql data directory>/edb_audit/audit.csv { size 10M dateext dateformat .%Y-%m-%d.%s copytruncate rotate 8 } (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) 2) Create the file /etc/cron.hourly/logrotate with these contents: #!/bin/sh /usr/sbin/logrotate /etc/logrotate.conf EXITVALUE=$? if [ $EXITVALUE != 0 ]; then /usr/bin/logger -t logrotate "ALERT exited abnormally with [$EXITVALUE]" fi exit 0 3) Issue these SQL statements: ALTER SYSTEM SET edb_audit_filename = 'audit'; SELECT pg_reload_conf();
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- PPS9-00-002600
- Vuln IDs
-
- V-68913
- Rule IDs
-
- SV-83517r1_rule
Checks: C-69383r1_chk
Verify User ownership, Group ownership, and permissions on the “edb_audit” directory: > ls –ald <postgresql data directory>/edb_audit If the User owner is not “enterprisedb”, this is a finding If the Group owner is not “enterprisedb”, this is a finding. If the directory is more permissive than 700, this is a finding. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
Fix: F-75095r1_fix
Run these commands: 1) "chown enterprisedb <postgresql data directory>/edb_audit" 2) "chgrp enterprisedb <postgresql data directory>/edb_audit" 3) "chmod 700 <postgresql data directory>/edb_audit" (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- PPS9-00-002700
- Vuln IDs
-
- V-68915
- Rule IDs
-
- SV-83519r1_rule
Checks: C-69385r1_chk
Verify User ownership, Group ownership, and permissions on the “edb_audit” directory: > ls –ald <postgresql data directory>/edb_audit If the User owner is not “enterprisedb”, this is a finding If the Group owner is not “enterprisedb”, this is a finding. If the directory is more permissive than 700, this is a finding. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
Fix: F-75097r1_fix
Run these commands: 1) "chown enterprisedb <postgresql data directory>/edb_audit" 2) "chgrp enterprisedb <postgresql data directory>/edb_audit" 3) "chmod 700 <postgresql data directory>/edb_audit" (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- PPS9-00-002800
- Vuln IDs
-
- V-68917
- Rule IDs
-
- SV-83521r1_rule
Checks: C-69387r1_chk
Verify User ownership, Group ownership, and permissions on the “edb_audit” directory: > ls –ald <postgresql data directory>/edb_audit If the User owner is not “enterprisedb”, this is a finding If the Group owner is not “enterprisedb”, this is a finding. If the directory is more permissive than 700, this is a finding. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
Fix: F-75099r1_fix
Run these commands: 1) "chown enterprisedb <postgresql data directory>/edb_audit" 2) "chgrp enterprisedb <postgresql data directory>/edb_audit" 3) "chmod 700 <postgresql data directory>/edb_audit" (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- PPS9-00-002900
- Vuln IDs
-
- V-68919
- Rule IDs
-
- SV-83523r1_rule
Checks: C-69389r1_chk
Verify User ownership, Group ownership, and permissions on the “edb_audit” directory: > ls –ald <postgresql data directory>/edb_audit If the User owner is not “enterprisedb”, this is a finding If the Group owner is not “enterprisedb”, this is a finding. If the directory is more permissive than 700, this is a finding. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
Fix: F-75101r1_fix
Run these commands: 1) "chown enterprisedb <postgresql data directory>/edb_audit" 2) "chgrp enterprisedb <postgresql data directory>/edb_audit" 3) "chmod 700 <postgresql data directory>/edb_audit" (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- PPS9-00-003000
- Vuln IDs
-
- V-68921
- Rule IDs
-
- SV-83525r1_rule
Checks: C-69391r1_chk
Verify User ownership, Group ownership, and permissions on the “edb_audit” directory: > ls –ald <postgresql data directory>/edb_audit If the User owner is not “enterprisedb”, this is a finding If the Group owner is not “enterprisedb”, this is a finding. If the directory is more permissive than 700, this is a finding. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
Fix: F-75103r1_fix
Run these commands: 1) "chown enterprisedb <postgresql data directory>/edb_audit" 2) "chgrp enterprisedb <postgresql data directory>/edb_audit" 3) "chmod 700 <postgresql data directory>/edb_audit" (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001495
- Version
- PPS9-00-003100
- Vuln IDs
-
- V-68923
- Rule IDs
-
- SV-83527r1_rule
Checks: C-69393r1_chk
Verify User ownership, Group ownership, and permissions on the “edb_audit” directory: > ls –ald <postgresql data directory>/edb_audit If the User owner is not “enterprisedb”, this is a finding If the Group owner is not “enterprisedb”, this is a finding. If the directory is more permissive than 700, this is a finding. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
Fix: F-75105r1_fix
Run these commands: 1) "chown enterprisedb <postgresql data directory>/edb_audit" 2) "chgrp enterprisedb <postgresql data directory>/edb_audit" 3) "chmod 700 <postgresql data directory>/edb_audit" (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- PPS9-00-003200
- Vuln IDs
-
- V-68925
- Rule IDs
-
- SV-83529r1_rule
Checks: C-69395r1_chk
Review monitoring procedures and implementation evidence to verify monitoring of changes to database software libraries, related applications, and configuration files is done. Verify the list of files and directories being monitored is complete. If monitoring does not occur or is not complete, this is a finding.
Fix: F-75107r1_fix
Implement procedures to monitor for unauthorized changes to DBMS software libraries, related software application libraries, and configuration files. If a third-party automated tool is not employed, an automated job that reports file information on the directories and files of interest and compares them to the baseline report for the same will meet the requirement. Use file hashes or checksums for comparisons, as file dates may be manipulated by malicious users.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- PPS9-00-003210
- Vuln IDs
-
- V-68927
- Rule IDs
-
- SV-83531r1_rule
Checks: C-69397r1_chk
Check the EDB Postgres configuration for a timed job that automatically checks all system and user-defined procedures, functions and triggers for being modified by running the following EDB Postgres query: select job, what from ALL_JOBS; (Alternatively, in Postgres Enterprise Manager, navigate to the "Jobs" node of the database and examine the job from there.) If a timed job or some other method is not implemented to check for Triggers being modified, this is a finding.
Fix: F-75109r1_fix
Configure an EDB Postgres timed job that automatically checks all system and user-defined procedures, functions and triggers for being modified, and in the event of such changes informs the proper personnel for evaluation and possible action.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- PPS9-00-003300
- Vuln IDs
-
- V-68929
- Rule IDs
-
- SV-83533r1_rule
Checks: C-69399r1_chk
Review procedures for controlling, granting access to, and tracking use of the DBMS software installation account. If access or use of this account is not restricted to the minimum number of personnel required or if unauthorized access to the account has been granted, this is a finding.
Fix: F-75111r1_fix
Develop, document, and implement procedures to restrict and track use of the DBMS software installation account.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- PPS9-00-003400
- Vuln IDs
-
- V-68931
- Rule IDs
-
- SV-83535r1_rule
Checks: C-69401r1_chk
Review the DBMS software library directory and note other root directories located on the same disk directory or any subdirectories. If any non-DBMS software directories exist on the disk directory, examine or investigate their use. If any of the directories are used by other applications, including third-party applications that use the DBMS, this is a finding. Only applications that are required for the functioning and administration, not use, of the DBMS should be located in the same disk directory as the DBMS software libraries. If other applications are located in the same directory as the DBMS, this is a finding.
Fix: F-75113r1_fix
Install all applications on directories separate from the DBMS software library directory. Relocate any directories or reinstall other application software that currently shares the DBMS software library directory.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- PPS9-00-003500
- Vuln IDs
-
- V-68933
- Rule IDs
-
- SV-83537r1_rule
Checks: C-69403r1_chk
Review system documentation to identify accounts authorized to own database objects. Review accounts that own objects in the database(s) by running this SQL command: select * from sys.all_objects; If any database objects are found to be owned by users not authorized to own database objects, this is a finding.
Fix: F-75115r1_fix
Assign ownership of authorized objects to authorized object owner accounts by running this SQL command for each object to be changed: ALTER <type> <object name> OWNER TO <new owner>; For example: ALTER TABLE my_table OWNER TO APP_USER;
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- PPS9-00-003600
- Vuln IDs
-
- V-68935
- Rule IDs
-
- SV-83539r1_rule
Checks: C-69405r2_chk
Use psql to connect to the db as enterprisedb and run this command: \dp *.* If any unauthorized roles have unauthorized accesses, this is a finding. Definitions of the access privileges are defined here: http://www.postgresql.org/docs/current/static/sql-grant.html
Fix: F-75117r1_fix
Revoke unauthorized privileges. The syntax is: REVOKE <privilege> ON <object> FROM <role>. Example: REVOKE INSERT ON a FROM PUBLIC; See PostgreSQL documentation for details.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- PPS9-00-003700
- Vuln IDs
-
- V-68937
- Rule IDs
-
- SV-83541r1_rule
Checks: C-69407r1_chk
Review vendor documentation and vendor websites for vendor-provided demonstration or sample databases, database applications, objects, and files. Review the DBMS to determine if any of the demonstration and sample databases, database applications, or files are installed in the database or are included with the DBMS application. If any are present in the database or are included with the DBMS application, this is a finding. Check for the existence of EDB Postgres sample databases: postgres and edb. Execute the following SQL as enterprisedb: SELECT datname FROM pg_database WHERE datistemplate = false; If any databases are listed here that are not used by the application, this is a finding.
Fix: F-75119r1_fix
Remove any unused sample databases from the DBMS. To remove a database, execute the follow SQL: DROP DATABASE <database>;
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- PPS9-00-003800
- Vuln IDs
-
- V-68939
- Rule IDs
-
- SV-83543r1_rule
Checks: C-69409r1_chk
Review the list of components and features installed with the database. If unused components are installed and are not documented and authorized, this is a finding. RPM can also be used to check to see what is installed: yum list installed | grep ppas This returns EDB database packages that have been installed. If any packages displayed by this command are not being used, this is a finding.
Fix: F-75121r1_fix
If any components are required for operation of applications that will be accessing the DBMS, include them in the system documentation. To uninstall and unused package (using ppas-odbc-devel-09.03.0400.02-1.rhel7.x86_64 as an example), execute the following command as root: yum erase -y ppas-odbc-devel-09.03.0400.02-1.rhel7.x86_64
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- PPS9-00-003900
- Vuln IDs
-
- V-68941
- Rule IDs
-
- SV-83545r1_rule
Checks: C-69411r1_chk
Run the following command as root: yum list installed | grep ppas If any packages are installed that are not needed, this is a finding.
Fix: F-75123r1_fix
Review the EDB PPAS packages available in the installation guide here: http://www.enterprisedb.com/docs/en/9.5/instguide/Postgres_Plus_Advanced_Server_Installation_Guide.1.14.html# Uninstall any unneeded packages by running the following as root: yum erase -y <package-name> At a minimum, the ppas94-server-* packages are required, but other packages such as jdbc, postgis, pgpool and others may be required by applications that need the functionality provided in these additional packages
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- PPS9-00-004000
- Vuln IDs
-
- V-68943
- Rule IDs
-
- SV-83547r1_rule
Checks: C-69415r1_chk
Run the following command as root: yum list installed | grep ppas If any packages are installed that are not needed, this is a finding.
Fix: F-75127r1_fix
Review the EDB PPAS packages available in the installation guide here: http://www.enterprisedb.com/docs/en/9.5/instguide/Postgres_Plus_Advanced_Server_Installation_Guide.1.14.html# Uninstall any unneeded packages by running the following as root: #> yum erase -y <package-name> At a minimum, the ppas94-server-* packages are required, but other packages such as jdbc, postgis, pgpool and others may be required by applications that need the functionality provided in these additional packages
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- PPS9-00-004100
- Vuln IDs
-
- V-68945
- Rule IDs
-
- SV-83549r1_rule
Checks: C-69417r1_chk
Execute the following SQL as enterprisedb: SHOW port; SHOW listen_addresses; If the port or addresses are not approved, this is a finding.
Fix: F-75129r1_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET port = <port>; ALTER SYSTEM SET listen_addresses = <comma separated addresses>; Execute the following operating system command as root: systemctl restart ppas-9.5.service
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- PPS9-00-004300
- Vuln IDs
-
- V-68947
- Rule IDs
-
- SV-83551r1_rule
Checks: C-69419r1_chk
Execute the following SQL as enterprisedb: SHOW password_encryption; If the value is not "on", this is a finding.
Fix: F-75131r1_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET password_encryption = on; SELECT pg_reload_conf();
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- PPS9-00-004400
- Vuln IDs
-
- V-68949
- Rule IDs
-
- SV-83553r1_rule
Checks: C-69421r1_chk
Open "<postgresql data directory>/pg_hba.conf" in a viewer or editor. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) If any rows have "password" specified for the "METHOD" column, this is a finding.
Fix: F-75133r1_fix
Open "<postgresql data directory>/pg_hba.conf" in an editor. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) For any rows that have "password" specified for the "METHOD" column, change the value to "md5".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- PPS9-00-004500
- Vuln IDs
-
- V-68951
- Rule IDs
-
- SV-83555r1_rule
Checks: C-69423r1_chk
Open "<postgresql data directory>/pg_hba.conf" in a viewer or editor. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) If any rows have TYPE of "hostssl" but do not include "clientcert=1" in the OPTIONS column at the end of the line, this is a finding.
Fix: F-75135r1_fix
Open "<postgresql data directory>/pg_hba.conf" in an editor. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) For any rows that have TYPE of "hostssl", append "clientcert=1" in the OPTIONS column at the end of the line.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000186
- Version
- PPS9-00-004600
- Vuln IDs
-
- V-68953
- Rule IDs
-
- SV-83557r1_rule
Checks: C-69425r3_chk
Verify User ownership, Group ownership, and permissions on the “server.key” file: > ls –alL <postgresql data directory>/server.key If the User owner is not “enterprisedb”, this is a finding If the Group owner is not “enterprisedb”, this is a finding. If the file is more permissive than 600, this is a finding. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
Fix: F-75137r1_fix
Run these commands: 1) "chown enterprisedb <postgresql data directory>/server.key" 2) "chgrp enterprisedb <postgresql data directory>/server.key" 3) "chmod 600 <postgresql data directory>/server.key" (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
- RMF Control
- IA-6
- Severity
- H
- CCI
- CCI-000206
- Version
- PPS9-00-004810
- Vuln IDs
-
- V-68955
- Rule IDs
-
- SV-83559r2_rule
Checks: C-69427r1_chk
Determine whether any applications that access the database allow for entry of the account name and password or PIN. If any do, determine whether these applications obfuscate authentication data. If they do not, this is a finding.
Fix: F-75139r1_fix
Configure or modify applications to prohibit display of passwords in clear text.
- RMF Control
- IA-6
- Severity
- H
- CCI
- CCI-000206
- Version
- PPS9-00-004820
- Vuln IDs
-
- V-68957
- Rule IDs
-
- SV-83561r1_rule
Checks: C-69429r1_chk
For psql, which cannot be configured not to accept a plain-text password, and any other essential tool with the same limitation, verify that the system documentation explains the need for the tool, who uses it, and any relevant mitigations and that AO approval has been obtained. If not, this is a finding. Request evidence that all users of the tool are trained in the importance of using the "-P" option and not using the plain-text password option and in how to keep the password hidden and that they adhere to this practice. If not, this is a finding.
Fix: F-75141r1_fix
For psql, which can accept a plain-text password, and any other essential tool with the same limitation: 1) Document the need for it, who uses it, and any relevant mitigations, and obtain AO approval. 2) Train all users of the tool in the importance of not using the plain-text password option and in how to keep the password hidden by using the "-P" option.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- PPS9-00-004900
- Vuln IDs
-
- V-68959
- Rule IDs
-
- SV-83563r1_rule
Checks: C-69431r1_chk
If a FIPS-certified OpenSSL library is not installed and configured, this is a finding. Run this command to ensure that you are running RHEL: "cat /etc/redhat-release" Run this command to see the OpenSSL version: "openssl version" If "/etc/redhat-release" does not show a supported version of Red Hat Enterprise Linux or if the openssl version does not include "-fips" in the version, this is a finding.
Fix: F-75143r1_fix
There is no known fix for a FIPS-compliant OpenSSL library on Microsoft Windows at this time. Configure RHEL OpenSSL as defined in section 9.1 of the RHEL OpenSSL FIPS Compliance documentation here: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1758.pdf
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- PPS9-00-005700
- Vuln IDs
-
- V-68961
- Rule IDs
-
- SV-83565r2_rule
Checks: C-69433r2_chk
If the application owner and Authorizing Official have determined that encryption of data at rest is NOT required, this is not a finding. Execute the following command as root: > df If the mounted filesystem where "<postgresql data directory>" exists is not located on an encrypted disk partition, this is a finding. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
Fix: F-75145r1_fix
Create an encrypted partition to host the "<postgresql data directory>" directory. This can be done at the OS level with a technology such as db-crypt or other encryption technologies provided by third-party tools. One option is to use LUKS as documented here: https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Security_Guide/sec-Encryption.html (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- PPS9-00-005800
- Vuln IDs
-
- V-68963
- Rule IDs
-
- SV-83567r1_rule
Checks: C-69435r1_chk
All PPAS built-in security packages are in the sys, pg_catalog, information_schema, and dbo schemas. If any application-specific packages have been added to these schemas, this is a finding.
Fix: F-75147r1_fix
Remove all application-specific packages that were added to the sys, pg_catalog, information_schema, and dbo schemas.
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- PPS9-00-005900
- Vuln IDs
-
- V-68965
- Rule IDs
-
- SV-83569r1_rule
Checks: C-69437r1_chk
Review the procedures for the refreshing of development/test data from production. Review any scripts or code that exists for the movement of production data to development/test systems or to any other location or for any other purpose. Verify that copies of production data are not left in unprotected locations. If the code that exists for data movement does not comply with the organization-defined data transfer policy and/or fails to remove any copies of production data from unprotected locations, this is a finding.
Fix: F-75149r1_fix
Modify any code used for moving data from production to development/test systems to comply with the organization-defined data transfer policy and to ensure copies of production data are not left in unsecured locations.
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- PPS9-00-006100
- Vuln IDs
-
- V-68967
- Rule IDs
-
- SV-83571r1_rule
Checks: C-69439r1_chk
Verify User ownership, Group ownership, and permissions on the <postgressql data directory> directory: > ls –ald <postgresql data directory> If the User owner is not “enterprisedb”, this is a finding If the Group owner is not “enterprisedb”, this is a finding. If the directory is more permissive than 700, this is a finding. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
Fix: F-75151r1_fix
Run these commands: 1) "chown enterprisedb <postgresql data directory>" 2) "chgrp enterprisedb <postgresql data directory>" 3) "chmod 700 <postgresql data directory>" (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- PPS9-00-006200
- Vuln IDs
-
- V-68969
- Rule IDs
-
- SV-83573r2_rule
Checks: C-69441r2_chk
Execute the following SQL as enterprisedb: SELECT * FROM sqlprotect.list_protected_users; If the database and user that handles user input is not listed or if sqlprotect.list_protected_users does not exist (meaning SQL/Protect is not installed), and an alternative means of reviewing for vulnerable code is not in use, this is a finding.
Fix: F-75153r4_fix
Install and configure SQL/Protect as documented here: http://www.enterprisedb.com/docs/en/9.5/eeguide/Postgres_Plus_Enterprise_Edition_Guide.1.072.html# Alternatively, implement, document, and maintain another method of checking for the validity of inputs.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- PPS9-00-006300
- Vuln IDs
-
- V-68971
- Rule IDs
-
- SV-83575r3_rule
Checks: C-69443r2_chk
Execute the following SQL as enterprisedb: SELECT * FROM sqlprotect.list_protected_users; If the database and user that handles user input is not listed or if sqlprotect.list_protected_users does not exist (meaning SQL/Protect is not installed), and an alternative means of reviewing for vulnerable code is not in use, this is a finding.
Fix: F-75155r3_fix
Install and configure SQL/Protect as documented here: http://www.enterprisedb.com/docs/en/9.5/eeguide/Postgres_Plus_Enterprise_Edition_Guide.1.072.html# Alternatively, implement, document, and maintain another method of checking for the validity of inputs.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- PPS9-00-006400
- Vuln IDs
-
- V-68973
- Rule IDs
-
- SV-83577r3_rule
Checks: C-69445r2_chk
Execute the following SQL as enterprisedb: SELECT * FROM sqlprotect.list_protected_users; If the database and user that handles user input is not listed or if sqlprotect.list_protected_users does not exist (meaning SQL/Protect is not installed), and an alternative means of reviewing for vulnerable code is not in use, this is a finding.
Fix: F-75157r3_fix
Install and configure SQL/Protect as documented here: http://www.enterprisedb.com/docs/en/9.5/eeguide/Postgres_Plus_Enterprise_Edition_Guide.1.072.html# Alternatively, implement, document, and maintain another method of checking for the validity of inputs.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- PPS9-00-006500
- Vuln IDs
-
- V-68975
- Rule IDs
-
- SV-83579r2_rule
Checks: C-69447r1_chk
Check custom database code to verify that error messages do not contain information beyond what is needed for troubleshooting the issue. If custom database errors contain PII data, sensitive business data, or information useful for identifying the host system or database structure, this is a finding.
Fix: F-75159r1_fix
Configure custom database code and associated application code not to divulge sensitive information or information useful for system identification in error messages.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- PPS9-00-006600
- Vuln IDs
-
- V-68977
- Rule IDs
-
- SV-83581r2_rule
Checks: C-69449r1_chk
Check custom database code to determine if detailed error messages are ever displayed to unauthorized individuals. If detailed error messages are displayed to individuals not authorized to view them, this is a finding.
Fix: F-75161r1_fix
Configure custom database code and associated application code not to display detailed error messages to those not authorized to view them.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- PPS9-00-006700
- Vuln IDs
-
- V-68979
- Rule IDs
-
- SV-83583r1_rule
Checks: C-69451r1_chk
Review system documentation to obtain the organization's definition of circumstances requiring automatic session termination. If the documentation explicitly states that such termination is not required or is prohibited, this is not a finding. If the documentation requires automatic session termination but the DBMS is not configured via triggers, scripts, or other organization-defined manners to terminate sessions when required, this is a finding.
Fix: F-75163r1_fix
Execute this SQL command in the places where the documentation requires automatic session termination: SELECT pg_terminate_backend(pid) FROM pg_stat_activity WHERE usename = '<username>'
- RMF Control
- AC-16
- Severity
- M
- CCI
- CCI-002262
- Version
- PPS9-00-006900
- Vuln IDs
-
- V-68981
- Rule IDs
-
- SV-83585r1_rule
Checks: C-69453r1_chk
If security labeling is not required, this is not applicable (NA). If security labeling requirements have been specified, execute the following SQL as enterprisedb: SELECT * from ALL_POLICIES where OBJECT_NAME = '<table name>'; If a policy is not enabled for the table requiring security labeling, this is a finding.
Fix: F-75165r1_fix
Create a row-level policy for all required tables as defined here: http://www.enterprisedb.com/docs/en/9.5/oracompat/Database_Compatibility_for_Oracle_Developers_Guide.1.201.html#pID0E0D5J0HA
- RMF Control
- AC-16
- Severity
- M
- CCI
- CCI-002263
- Version
- PPS9-00-007000
- Vuln IDs
-
- V-68983
- Rule IDs
-
- SV-83587r1_rule
Checks: C-69455r1_chk
If security labeling is not required, this is not applicable (NA). If security labeling requirements have been specified, execute the following SQL as enterprisedb: SELECT * from ALL_POLICIES where OBJECT_NAME = '<table name>'; If a policy is not enabled for the table requiring security labeling, this is a finding.
Fix: F-75167r1_fix
Create a row-level policy for all required tables as defined here: http://www.enterprisedb.com/docs/en/9.5/oracompat/Database_Compatibility_for_Oracle_Developers_Guide.1.201.html#pID0E0D5J0HA
- RMF Control
- AC-16
- Severity
- M
- CCI
- CCI-002264
- Version
- PPS9-00-007100
- Vuln IDs
-
- V-68985
- Rule IDs
-
- SV-83589r1_rule
Checks: C-69457r1_chk
If security labeling is not required, this is not applicable (NA). If security labeling requirements have been specified, execute the following SQL as enterprisedb: SELECT * from ALL_POLICIES where OBJECT_NAME = '<table name>'; If a policy is not enabled for the table requiring security labeling, this is a finding.
Fix: F-75169r1_fix
Create a row-level policy for all required tables as defined here: http://www.enterprisedb.com/docs/en/9.5/oracompat/Database_Compatibility_for_Oracle_Developers_Guide.1.201.html#pID0E0D5J0HA
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- PPS9-00-007400
- Vuln IDs
-
- V-68987
- Rule IDs
-
- SV-83591r1_rule
Checks: C-69459r1_chk
Review the system documentation to obtain the definition of the database/DBMS functionality considered privileged in the context of the system in question. If any functionality considered privileged has access privileges granted to non-privileged users, this is a finding.
Fix: F-75171r1_fix
Revoke any privileges to privileged functionality by executing the REVOKE command as documented here: http://www.postgresql.org/docs/current/static/sql-revoke.html
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002233
- Version
- PPS9-00-007500
- Vuln IDs
-
- V-68989
- Rule IDs
-
- SV-83593r2_rule
Checks: C-69461r1_chk
Review the system documentation and source code of the application(s) using the database. If elevation of DBMS privileges is used but not documented, this is a finding. If elevation of DBMS privileges is documented but not implemented as described in the documentation, this is a finding. If the privilege-elevation logic can be invoked in ways other than intended, in contexts other than intended, or by subjects/principals other than intended, this is a finding. Execute the following SQL to find any SECURITY DEFINER functions (meaning they are executed as owner rather than invoker): select proname from pg_proc where prosecdef = true; If any of these functions should not be SECURITY DEFINER, this is a finding.
Fix: F-75173r2_fix
Determine where, when, how, and by what principals/subjects elevated privilege is needed. Modify the system and the application(s) using the database to ensure privilege elevation is used only as required. To alter a function to use SECURITY INVOKER instead of SECURITY DEFINER, execute the following SQL: ALTER FUNCTION <function()> SECURITY INVOKER;
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002233
- Version
- PPS9-00-007510
- Vuln IDs
-
- V-68991
- Rule IDs
-
- SV-83595r2_rule
Checks: C-69463r1_chk
Review the system documentation and source code of the application(s) using the database. If elevation of DBMS privileges is used but not documented, this is a finding. If elevation of DBMS privileges is documented but not implemented as described in the documentation, this is a finding. If the privilege-elevation logic can be invoked in ways other than intended, in contexts other than intended, or by subjects/principals other than intended, this is a finding. Execute the following SQL to find any users with BYPASS RLS permissions: select rolname from pg_roles where rolbypassrls = true; If any of these users are not superusers that should bypass RLS, this is a finding.
Fix: F-75175r1_fix
Determine where, when, how, and by what principals/subjects elevated privilege is needed. Modify the system and the application(s) using the database to ensure privilege elevation is used only as required. To alter a user to not allow bypassing RLS, execute the following SQL: ALTER USER <user> NOBYPASSRLS;
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001844
- Version
- PPS9-00-007700
- Vuln IDs
-
- V-68993
- Rule IDs
-
- SV-83597r1_rule
Checks: C-69465r1_chk
If a centralized log collecting tool such as Postgres Enterprise Manager (PEM) is not installed and configured to automatically collect audit logs, this is a finding. Review the system documentation for a description of how audit records are off-loaded and how local audit log space is managed.
Fix: F-75177r1_fix
Install a centralized log collecting tool and configure it as instructed in its documentation. If using PEM, find the instructions at http://www.enterprisedb.com/docs/en/6.0/pemgetstarted/toc.html
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001844
- Version
- PPS9-00-007800
- Vuln IDs
-
- V-68995
- Rule IDs
-
- SV-83599r1_rule
Checks: C-69467r1_chk
If a unified tool for audit configuration such as PEM (Postgres Enterprise Manager) is not installed and configured to automatically collect audit logs, this is a finding. Review the system documentation for a description of how audit records are off-loaded and how local audit log space is managed.
Fix: F-75179r1_fix
Install a centralized log collecting tool and configure it as instructed in its documentation. If using PEM, find the instructions at http://www.enterprisedb.com/docs/en/6.0/pemgetstarted/toc.html
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- PPS9-00-007900
- Vuln IDs
-
- V-68997
- Rule IDs
-
- SV-83601r1_rule
Checks: C-69469r1_chk
Investigate whether there have been any incidents where the DBMS ran out of audit log space since the last time the space was allocated or other corrective measures were taken. If there have been, this is a finding.
Fix: F-75181r1_fix
Allocate sufficient audit file space to "<postgresql data directory>/edb_audit" to support peak demand.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- PPS9-00-008000
- Vuln IDs
-
- V-68999
- Rule IDs
-
- SV-83603r1_rule
Checks: C-69471r1_chk
If Postgres Enterprise Manager (PEM) or another similar monitoring capability is not installed and configured to probe storage volume utilization of "<postgresql data directory>" and notify appropriate support staff upon storage volume utilization reaching 75 percent, this is a finding. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
Fix: F-75183r1_fix
Install PEM and configure a probe to monitor "<postgresql data directory>" and notify appropriate support staff upon storage volume utilization reaching 75 percent. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) Example steps for creating a probe are below, using the thin client (browser) PEM interface. Refer also to the Supplemental Procedures document, supplied with this STIG. Open the PEM web console in a browser - Log in - Click on the agent for the machine to be monitored - Select "Management | Probe Configuration" - Select "Disk Space" and set the check interval as you like - Select "Management | Alerting" - Name the definition "Audit Log Full" - Select Template "Disk Consumption Percentage" - Set Frequency, Comparison Operator, and Thresholds (1 minute, >, 95/96/97 for example) - Enter the Mount Point for where the audit log is - Click Notification tab - Click Email all alerts - Click "Execute Script" on Monitored Server - Enter script to showdown postgres, generally "service ppas-95 stop" - Click Add/Change to save, click "OK" to exit dialog box
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- PPS9-00-008100
- Vuln IDs
-
- V-69001
- Rule IDs
-
- SV-83605r2_rule
Checks: C-69473r2_chk
Review Postgres Enterprise Manager (PEM) alert settings, OS, or third-party logging software settings to determine whether a real-time alert will be sent to the appropriate personnel when auditing fails for any reason. If real-time alerts are not sent upon auditing failure, this is a finding.
Fix: F-75185r1_fix
Install PEM and configure audit failure event alerting as documented here: http://www.enterprisedb.com/docs/en/5.0/pemgetstarted/PEM_Getting_Started_Guide.1.28.html An example for creating an alert that ensure the audit directory does not fill up is included below, using the thin client (browser) PEM interface. Refer also to the Supplemental Procedures document, supplied with this STIG. Open the PEM web console in a browser - Log in - Click on the agent for the machine to be monitored - Select "Management | Probe Configuration" - Select "Disk Space" and set the check interval as you like - Select "Management | Alerting" - Name the definition "Audit Log Full" - Select Template "Disk Consumption Percentage" - Set Frequency, Comparison Operator, and Thresholds (1 minute, >, 95/96/97 for example) - Enter the Mount Point for where the audit log is - Click Notification tab - Click Email all alerts - Click "Execute Script" on Monitored Server
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- PPS9-00-008400
- Vuln IDs
-
- V-69003
- Rule IDs
-
- SV-83607r1_rule
Checks: C-69475r1_chk
If EDB Postgres supports only software development, experimentation, and/or developer-level testing (that is, excluding production systems, integration testing, stress testing, and user acceptance testing), this is not a finding. Review the EDB Postgres security settings with respect to non-administrative users' ability to create, alter, or replace logic modules, to include but not necessarily only stored procedures, functions, triggers, and views. These psql commands can help with showing existing permissions of databases and schemas: \l \dn+ If any such permissions exist and are not documented and approved, this is a finding.
Fix: F-75187r1_fix
Document and obtain approval for any non-administrative users who require the ability to create, alter, or replace logic modules. Implement the approved permissions. Revoke (or deny) any unapproved permissions and remove any unauthorized role memberships.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- PPS9-00-008500
- Vuln IDs
-
- V-69005
- Rule IDs
-
- SV-83609r1_rule
Checks: C-69477r1_chk
Review the security configuration of the EDB Postgres database(s). If unauthorized users can start the SQL Server Configuration Manager or SQL Server Management Studio, this is a finding. If EDB Postgres does not enforce access restrictions associated with changes to the configuration of the database(s), this is a finding. - - - - - To assist in conducting reviews of permissions, the following psql commands describe permissions of databases, schemas, and users: \l \dn+ \du Permissions of concern in this respect include the following, and possibly others: - any user with SUPERUSER privileges - any database or schema with "C" (create) or "w" (update) privileges that are not necessary
Fix: F-75189r1_fix
Configure EDB PPAS to enforce access restrictions associated with changes to the configuration of the EDB Postgres database(s).
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001814
- Version
- PPS9-00-008600
- Vuln IDs
-
- V-69007
- Rule IDs
-
- SV-83611r2_rule
Checks: C-69479r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75191r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- PPS9-00-008700
- Vuln IDs
-
- V-69009
- Rule IDs
-
- SV-83613r1_rule
Checks: C-69481r1_chk
Review the network functions, ports, protocols, and services supported by the DBMS. If any protocol is prohibited by the PPSM guidance and is enabled, this is a finding. Open "<postgresql data directory>/pg_hba.conf" in a viewer. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) If any rows have a TYPE that is "host" or "hostnossl", this is a finding. Execute the following SQL as enterprisedb: SHOW port; If the displayed port is not allowed, this is a finding.
Fix: F-75193r1_fix
Disable each prohibited network function, port, protocol, or service prohibited by the PPSM guidance. Open "<postgresql data directory>/pg_hba.conf" in an editor. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) Change the TYPE of any rows not starting with a "#" to be either "local" or "hostssl". The METHOD for the local rows should be "peer", which will authenticate based on the operating system name. The METHOD for the hostssl rows should be one of these (in preferred order): cert, ldap, sspi, pam, md5 Execute the following SQL as enterprisedb: ALTER SYSTEM SET port = <port>; Execute the following operating system command as root: systemctl restart ppas-9.5.service
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- PPS9-00-008800
- Vuln IDs
-
- V-69011
- Rule IDs
-
- SV-83615r1_rule
Checks: C-69483r1_chk
If organization-defined circumstances or situations require re-authentication, and these situations are not configured to terminate existing logins to require re-authentication, this is a finding.
Fix: F-75195r1_fix
Determine the organization-defined circumstances or situations that require re-authentication and ensure that the following SQL is executed in those situations. To require a single user to re-authenticate, use this SQL: "select pg_terminate_backend(pid) from pg_stat_activity where user='<username>';" To require all users to re-authenticate, use this SQL: "select pg_terminate_backend(pid) from pg_stat_activity where user like '%';".
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- PPS9-00-009100
- Vuln IDs
-
- V-69013
- Rule IDs
-
- SV-83617r1_rule
Checks: C-69485r1_chk
Verify that the root.crt certificate was issued by a valid DoD entity. > openssl x509 -in <postgresql data directory>/root.crt –text | grep –i “issuer”. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) If any issuers are listed that are not valid DoD certificate authorities, this is a finding.
Fix: F-75197r1_fix
Remove any certificate that was not issued by a valid DoD certificate authority. Contact the organization's certificate issuer and request a new certificate that is issued by a valid DoD certificate authorities.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002475
- Version
- PPS9-00-009200
- Vuln IDs
-
- V-69015
- Rule IDs
-
- SV-83619r1_rule
Checks: C-69487r1_chk
Review the system documentation to determine whether the organization has defined the information at rest that is to be protected from modification, which must include, at a minimum, PII and classified information. If no information is identified as requiring such protection, this is not a finding. Review the configuration of the DBMS, operating system/file system, and additional software as relevant. If any of the information defined as requiring cryptographic protection from modification is not encrypted in a manner that provides the required level of protection, this is a finding.
Fix: F-75199r1_fix
Create an encrypted partition to host the "<postgresql data directory>" directory. This can be done at the OS level with a technology such as db-crypt or other encryption technologies provided by third-party tools. If only certain columns require encryption, use pgcrypt to encrypt those columns as documented here: http://www.postgresql.org/docs/current/static/pgcrypto.html
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- PPS9-00-009300
- Vuln IDs
-
- V-69017
- Rule IDs
-
- SV-83621r1_rule
Checks: C-69489r1_chk
Review the system documentation to determine whether the organization has defined the information at rest that is to be protected from modification, which must include, at a minimum, PII and classified information. If no information is identified as requiring such protection, this is not a finding. Review the configuration of the DBMS, operating system/file system, and additional software as relevant. If any of the information defined as requiring cryptographic protection from modification is not encrypted in a manner that provides the required level of protection, this is a finding.
Fix: F-75201r1_fix
Create an encrypted partition to host the "<postgresql data directory>" directory. This can be done at the OS level with a technology such as db-crypt or other encryption technologies provided by third-party tools. If only certain columns need encryption, use pgcrypt to encrypt those columns as documented here: http://www.postgresql.org/docs/current/static/pgcrypto.html
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002420
- Version
- PPS9-00-009500
- Vuln IDs
-
- V-69019
- Rule IDs
-
- SV-83623r1_rule
Checks: C-69491r1_chk
If the data owner does not have a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process, this is not a finding. Open "<postgresql data directory>/pg_hba.conf" in a viewer or editor. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) If any rows do not have TYPE of "hostssl" as well as a METHOD of "cert", this is a finding.
Fix: F-75203r1_fix
Open "<postgresql data directory>/pg_hba.conf" in an editor. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) Set all rows to have TYPE of "hostssl" and METHOD of "cert".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002422
- Version
- PPS9-00-009600
- Vuln IDs
-
- V-69021
- Rule IDs
-
- SV-83625r1_rule
Checks: C-69493r1_chk
If the data owner does not have a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process, this is not a finding. Open "<postgresql data directory>/pg_hba.conf" in a viewer or editor. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) If any rows do not have TYPE of "hostssl" as well as a METHOD of "cert", this is a finding.
Fix: F-75205r1_fix
Open "<postgresql data directory>/pg_hba.conf" in an editor. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) Set all rows to have TYPE of "hostssl" and METHOD of "cert".
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-002754
- Version
- PPS9-00-009700
- Vuln IDs
-
- V-69023
- Rule IDs
-
- SV-83627r3_rule
Checks: C-69495r2_chk
Execute the following SQL as enterprisedb: SELECT * FROM sqlprotect.list_protected_users; If the database and user that handles user input is not listed or if sqlprotect.list_protected_users does not exist (meaning SQL/Protect is not installed), and an alternative means of reviewing for vulnerable code is not in use, this is a finding.
Fix: F-75207r3_fix
Install and configure SQL/Protect as documented here: http://www.enterprisedb.com/docs/en/9.5/eeguide/Postgres_Plus_Enterprise_Edition_Guide.1.072.html# Alternatively, implement, document, and maintain another method of checking for the validity of inputs.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- PPS9-00-009900
- Vuln IDs
-
- V-69025
- Rule IDs
-
- SV-83629r1_rule
Checks: C-69497r1_chk
Obtain evidence that software patches are obtained from EnterpriseDB and are consistently applied to the DBMS within the timeframe defined for each patch. If such evidence cannot be obtained, or the evidence that is obtained indicates a pattern of noncompliance, this is a finding. If an administrator is not registered on the EDB Support Portal with an email address for monitoring technical alerts, this is a finding.
Fix: F-75209r1_fix
Institute and adhere to policies and procedures to ensure that patches are consistently obtained from EnterpriseDB and applied to the DBMS within the time allowed. Ensure that a monitored email address is registered as a user on the EDB support portal and is receiving technical alerts.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-010000
- Vuln IDs
-
- V-69027
- Rule IDs
-
- SV-83631r2_rule
Checks: C-69501r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75213r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-010100
- Vuln IDs
-
- V-69029
- Rule IDs
-
- SV-83633r2_rule
Checks: C-69503r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75215r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-010200
- Vuln IDs
-
- V-69031
- Rule IDs
-
- SV-83635r2_rule
Checks: C-69505r2_chk
Review the system documentation to determine whether it is required to track categorized information, such as classification or sensitivity level. If it is not, this is not applicable (NA). Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75217r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-010300
- Vuln IDs
-
- V-69033
- Rule IDs
-
- SV-83637r2_rule
Checks: C-69507r2_chk
Review the system documentation to determine whether it is required to track categorized information, such as classification or sensitivity level. If it is not, this is not applicable (NA). Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75219r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-010400
- Vuln IDs
-
- V-69035
- Rule IDs
-
- SV-83639r2_rule
Checks: C-69509r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75221r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-010500
- Vuln IDs
-
- V-69037
- Rule IDs
-
- SV-83641r2_rule
Checks: C-69511r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75223r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-010800
- Vuln IDs
-
- V-69039
- Rule IDs
-
- SV-83643r2_rule
Checks: C-69513r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75225r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-010900
- Vuln IDs
-
- V-69041
- Rule IDs
-
- SV-83645r2_rule
Checks: C-69515r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75227r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-011000
- Vuln IDs
-
- V-69043
- Rule IDs
-
- SV-83647r2_rule
Checks: C-69517r2_chk
Review the system documentation to determine whether it is required to track categorized information, such as classification or sensitivity level. If it is not, this is not applicable (NA). Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75229r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-011100
- Vuln IDs
-
- V-69045
- Rule IDs
-
- SV-83649r2_rule
Checks: C-69519r2_chk
Review the system documentation to determine whether it is required to track categorized information, such as classification or sensitivity level. If it is not, this is not applicable (NA). Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75231r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-011200
- Vuln IDs
-
- V-69047
- Rule IDs
-
- SV-83651r2_rule
Checks: C-69521r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75233r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-011300
- Vuln IDs
-
- V-69049
- Rule IDs
-
- SV-83653r2_rule
Checks: C-69523r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75235r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-011400
- Vuln IDs
-
- V-69051
- Rule IDs
-
- SV-83655r2_rule
Checks: C-69525r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75237r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-011500
- Vuln IDs
-
- V-69053
- Rule IDs
-
- SV-83657r2_rule
Checks: C-69527r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75239r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-011600
- Vuln IDs
-
- V-69055
- Rule IDs
-
- SV-83659r2_rule
Checks: C-69529r2_chk
Review the system documentation to determine whether it is required to track categorized information, such as classification or sensitivity level. If it is not, this is not applicable (NA). Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75241r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-011700
- Vuln IDs
-
- V-69057
- Rule IDs
-
- SV-83661r2_rule
Checks: C-69531r2_chk
Review the system documentation to determine whether it is required to track categorized information, such as classification or sensitivity level. If it is not, this is not applicable (NA). Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75243r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-011800
- Vuln IDs
-
- V-69059
- Rule IDs
-
- SV-83663r2_rule
Checks: C-69533r3_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_connect; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75245r3_fix
Execute the following SQL as enterprisedb: SHOW edb_audit_connect; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding. Fix Text: Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_connect = 'all'; ALTER SYSTEM SET edb_audit_disconnect = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-011900
- Vuln IDs
-
- V-69061
- Rule IDs
-
- SV-83665r2_rule
Checks: C-69535r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_connect; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75247r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_connect = 'all'; ALTER SYSTEM SET edb_audit_disconnect = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-012000
- Vuln IDs
-
- V-69063
- Rule IDs
-
- SV-83667r2_rule
Checks: C-69537r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75249r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-012100
- Vuln IDs
-
- V-69065
- Rule IDs
-
- SV-83669r2_rule
Checks: C-69539r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75251r3_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-012200
- Vuln IDs
-
- V-69067
- Rule IDs
-
- SV-83671r2_rule
Checks: C-69541r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_connect; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75253r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_connect = 'all'; ALTER SYSTEM SET edb_audit_disconnect = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-012300
- Vuln IDs
-
- V-69069
- Rule IDs
-
- SV-83673r2_rule
Checks: C-69543r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_connect; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75255r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_connect = 'all'; ALTER SYSTEM SET edb_audit_disconnect = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-012400
- Vuln IDs
-
- V-69071
- Rule IDs
-
- SV-83675r2_rule
Checks: C-69545r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75257r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-012500
- Vuln IDs
-
- V-69073
- Rule IDs
-
- SV-83677r2_rule
Checks: C-69547r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75259r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-012600
- Vuln IDs
-
- V-69075
- Rule IDs
-
- SV-83679r2_rule
Checks: C-69549r2_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; SHOW edb_audit_connect; SHOW edb_audit_disconnect; If the result is not "all" for any or if the current settings for this requirement have not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75261r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; ALTER SYSTEM SET edb_audit_connect = 'all'; ALTER SYSTEM SET edb_audit_disconnect = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- PPS9-00-012700
- Vuln IDs
-
- V-69077
- Rule IDs
-
- SV-83681r1_rule
Checks: C-69551r1_chk
If a FIPS-certified OpenSSL library is not installed, this is a finding. Run this command "cat /proc/sys/crypto/fips_enabled". If the output is not "1", this is a finding.
Fix: F-75263r1_fix
There is no known fix for a FIPS-compliant OpenSSL library on Microsoft Windows at this time. Configure RHEL OpenSSL as defined in section 9.1 of the RHEL OpenSSL FIPS Compliance documentation here: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1758.pdf
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- PPS9-00-012800
- Vuln IDs
-
- V-69079
- Rule IDs
-
- SV-83683r1_rule
Checks: C-69553r1_chk
If a FIPS-certified OpenSSL library is not installed, this is a finding. Run the command "cat /proc/sys/crypto/fips_enabled". If the output is not "1", this is a finding.
Fix: F-75265r1_fix
There is no known fix for a FIPS-compliant OpenSSL library on Microsoft Windows at this time. Configure RHEL OpenSSL as defined in section 9.1 of the RHEL OpenSSL FIPS Compliance documentation here: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1758.pdf
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- PPS9-00-012900
- Vuln IDs
-
- V-69081
- Rule IDs
-
- SV-83685r1_rule
Checks: C-69555r1_chk
If a FIPS-certified OpenSSL library is not installed, this is a finding. Run the command "cat /proc/sys/crypto/fips_enabled". If the output is not "1", this is a finding.
Fix: F-75267r1_fix
There is no known fix for a FIPS compliant OpenSSL library on Microsoft Windows at this time. Configure RHEL OpenSSL as defined in section 9.1 of the RHEL OpenSSL FIPS Compliance documentation here: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1758.pdf
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- PPS9-00-013000
- Vuln IDs
-
- V-69083
- Rule IDs
-
- SV-83687r1_rule
Checks: C-69557r1_chk
If Postgres Enterprise Manager (PEM) or another log collection tool is not installed and configured to automatically collect audit logs, this is a finding. Review the system documentation for a description of how audit records are off-loaded and how local audit log space is managed.
Fix: F-75269r1_fix
Install PEM and configure the centralized audit manager as documented here: http://www.enterprisedb.com/docs/en/5.0/pemgetstarted/PEM_Getting_Started_Guide.1.32.html# If another tool other than PEM is used, configure it to meet this requirement.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- PPS9-00-013200
- Vuln IDs
-
- V-69085
- Rule IDs
-
- SV-83689r1_rule
Checks: C-69559r1_chk
If the Postgres Plus Advanced Server is not installed on Red Hat Enterprise Linux (RHEL), this is a finding.
Fix: F-75271r1_fix
Install Postgres Plus Advanced Server on RHEL or ensure that FIPS 140-2 certified OpenSSL libraries are used by the DBMS.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-011050
- Vuln IDs
-
- V-69087
- Rule IDs
-
- SV-83691r2_rule
Checks: C-69561r2_chk
Review the system documentation to determine whether it is required to track categorized information, such as classification or sensitivity level. If it is not, this is not applicable (NA). Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75273r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-011150
- Vuln IDs
-
- V-69089
- Rule IDs
-
- SV-83693r2_rule
Checks: C-69563r2_chk
Review the system documentation to determine whether it is required to track categorized information, such as classification or sensitivity level. If it is not, this is not applicable (NA). Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-75275r2_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- PPS9-00-004200
- Vuln IDs
-
- V-69091
- Rule IDs
-
- SV-83695r1_rule
Checks: C-69565r1_chk
Open "<postgresql data directory>/pg_hba.conf" in a viewer or editor. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) If any rows have "trust" specified for the "METHOD" column, this is a finding.
Fix: F-75277r1_fix
Open "<postgresql data directory>/pg_hba.conf" in an editor. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) If any rows have "trust" specified for the "METHOD" column, delete the rows or change them to other authentication methods. Permitted methods in preferred order are: peer (local only), cert, ldap, sspi, pam, md5