EDB Postgres Advanced Server Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +108 −108
Comparison against the immediately-prior release (V1R7). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 108
- V-213561 Medium The EDB Postgres Advanced Server must limit the number of concurrent sessions to an organization-defined number per user for all accounts and/or account types.
- V-213562 Medium The EDB Postgres Advanced Server must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.
- V-213563 Medium The EDB Postgres Advanced Server must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
- V-213564 Medium The EDB Postgres Advanced Server must protect against a user falsely repudiating having performed organization-defined actions.
- V-213565 Medium The EDB Postgres Advanced Server must provide audit record generation capability for DoD-defined auditable events within all EDB Postgres Advanced Server/database components.
- V-213566 Medium The EDB Postgres Advanced Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
- V-213567 Medium The EDB Postgres Advanced Server must generate audit records when privileges/permissions are retrieved.
- V-213568 Medium The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.
- V-213569 Medium The EDB Postgres Advanced Server must initiate support of session auditing upon startup.
- V-213570 Medium The EDB Postgres Advanced Server must produce audit records containing sufficient information to establish what type of events occurred.
- V-213571 Medium The EDB Postgres Advanced Server must produce audit records containing time stamps to establish when the events occurred.
- V-213572 Medium The EDB Postgres Advanced Server must produce audit records containing sufficient information to establish where the events occurred.
- V-213573 Medium The EDB Postgres Advanced Server must produce audit records containing sufficient information to establish the sources (origins) of the events.
- V-213574 Medium The EDB Postgres Advanced Server must produce audit records containing sufficient information to establish the outcome (success or failure) of the events.
- V-213575 Medium The EDB Postgres Advanced Server must produce audit records containing sufficient information to establish the identity of any user/subject or process associated with the event.
- V-213576 Medium The EDB Postgres Advanced Server must include additional, more detailed, organization-defined information in the audit records for audit events identified by type, location, or subject.
- V-213577 Medium The EDB Postgres Advanced Server must by default shut down upon audit failure, to include the unavailability of space for more audit log records; or must be configurable to shut down upon audit failure.
- V-213578 High The EDB Postgres Advanced Server must be configurable to overwrite audit log records, oldest first (First-In-First-Out - FIFO), in the event of unavailability of space for more audit log records.
- V-213579 Medium The audit information produced by the EDB Postgres Advanced Server must be protected from unauthorized read access.
- V-213580 Medium The audit information produced by the EDB Postgres Advanced Server must be protected from unauthorized modification.
- V-213581 Medium The audit information produced by the EDB Postgres Advanced Server must be protected from unauthorized deletion.
- V-213582 Medium The EDB Postgres Advanced Server must protect its audit features from unauthorized access.
- V-213583 Medium The EDB Postgres Advanced Server must protect its audit configuration from unauthorized modification.
- V-213584 Medium The EDB Postgres Advanced Server must protect its audit features from unauthorized removal.
- V-213585 Medium Software, applications, and configuration files that are part of, or related to, the Postgres Plus Advanced Server installation must be monitored to discover unauthorized changes.
- V-213586 Medium EDB Postgres Advanced Server software modules, to include stored procedures, functions and triggers must be monitored to discover unauthorized changes.
- V-213587 Medium The EDB Postgres Advanced Server software installation account must be restricted to authorized users.
- V-213588 Medium Database software, including EDB Postgres Advanced Server configuration files, must be stored in dedicated directories, separate from the host OS and other applications.
- V-213589 Medium Database objects (including but not limited to tables, indexes, storage, stored procedures, functions, triggers, links to software external to the EDB Postgres Advanced Server, etc.) must be owned by database/EDB Postgres Advanced Server principals authorized for ownership.
- V-213590 Medium The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to the EDB Postgres Advanced Server, etc.) must be restricted to authorized users.
- V-213591 Medium Default, demonstration and sample databases, database objects, and applications must be removed.
- V-213592 Medium Unused database components, EDB Postgres Advanced Server software, and database objects must be removed.
- V-213593 Medium Unused database components which are integrated in the EDB Postgres Advanced Server and cannot be uninstalled must be disabled.
- V-213594 Medium Access to external executables must be disabled or restricted.
- V-213595 Medium The EDB Postgres Advanced Server must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
- V-213596 Medium The EDB Postgres Advanced Server must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
- V-213597 Medium If passwords are used for authentication, the EDB Postgres Advanced Server must store only hashed, salted representations of passwords.
- V-213598 Medium If passwords are used for authentication, the EDB Postgres Advanced Server must transmit only encrypted representations of passwords.
- V-213599 Medium The EDB Postgres Advanced Server, when utilizing PKI-based authentication, must validate certificates by performing RFC 5280-compliant certification path validation.
- V-213600 High The EDB Postgres Advanced Server must enforce authorized access to all PKI private keys stored/utilized by the EDB Postgres Advanced Server.
- V-213601 High Applications must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
- V-213602 High When using command-line tools such as psql, users must use a logon method that does not expose the password.
- V-213603 High The EDB Postgres Advanced Server must use NIST FIPS 140-2 validated cryptographic modules for cryptographic operations.
- V-213604 Medium The EDB Postgres Advanced Server must protect the confidentiality and integrity of all information at rest.
- V-213605 Medium The EDB Postgres Advanced Server must isolate security functions from non-security functions.
- V-213606 Medium Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.
- V-213607 Medium Access to database files must be limited to relevant processes and to authorized, administrative users.
- V-213608 Medium The EDB Postgres Advanced Server must check the validity of all data inputs except those specifically identified by the organization.
- V-213609 Medium The EDB Postgres Advanced Server and associated applications must reserve the use of dynamic code execution for situations that require it.
- V-213610 Medium The EDB Postgres Advanced Server and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.
- V-213611 Medium The EDB Postgres Advanced Server must provide non-privileged users with error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
- V-213612 Medium The EDB Postgres Advanced Server must reveal detailed error messages only to the ISSO, ISSM, SA and DBA.
- V-213613 Medium The EDB Postgres Advanced Server must automatically terminate a user session after organization-defined conditions or trigger events requiring session disconnect.
- V-213614 Medium The EDB Postgres Advanced Server must associate organization-defined types of security labels having organization-defined security label values with information in storage.
- V-213615 Medium The EDB Postgres Advanced Server must associate organization-defined types of security labels having organization-defined security label values with information in process.
- V-213616 Medium The EDB Postgres Advanced Server must associate organization-defined types of security labels having organization-defined security label values with information in transmission.
- V-213617 Medium The EDB Postgres Advanced Server must prevent non-privileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
- V-213618 Medium Execution of software modules (to include stored procedures, functions, and triggers) with elevated privileges must be restricted to necessary cases only.
- V-213619 Medium Execution of software modules (to include stored procedures, functions, and triggers) with elevated privileges must be restricted to necessary cases only.
- V-213620 Medium The EDB Postgres Advanced Server must utilize centralized management of the content captured in audit records generated by all components of the EDB Postgres Advanced Server.
- V-213621 Medium The EDB Postgres Advanced Server must provide centralized configuration of the content to be captured in audit records generated by all components of the EDB Postgres Advanced Server.
- V-213622 Medium The EDB Postgres Advanced Server must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
- V-213623 Medium The EDB Postgres Advanced Server must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75% of maximum audit record storage capacity.
- V-213624 Medium The EDB Postgres Advanced Server must provide an immediate real-time alert to appropriate support staff of all audit log failures.
- V-213625 Medium The EDB Postgres Advanced Server must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.
- V-213626 Medium The EDB Postgres Advanced Server must enforce access restrictions associated with changes to the configuration of the EDB Postgres Advanced Server or database(s).
- V-213627 Medium The EDB Postgres Advanced Server must produce audit records of its enforcement of access restrictions associated with changes to the configuration of the EDB Postgres Advanced Server or database(s).
- V-213628 Medium The EDB Postgres Advanced Server must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.
- V-213629 Medium The EDB Postgres Advanced Server must require users to re-authenticate when organization-defined circumstances or situations require re-authentication.
- V-213630 Medium The EDB Postgres Advanced Server must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs) for the establishment of all encrypted sessions.
- V-213631 Medium The EDB Postgres Advanced Server must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest (to include, at a minimum, PII and classified information) on organization-defined information system components.
- V-213632 Medium The EDB Postgres Advanced Server must implement cryptographic mechanisms preventing the unauthorized disclosure of organization-defined information at rest on organization-defined information system components.
- V-213633 Medium The EDB Postgres Advanced Server must maintain the confidentiality and integrity of information during preparation for transmission.
- V-213634 Medium The EDB Postgres Advanced Server must maintain the confidentiality and integrity of information during reception.
- V-213635 Medium When invalid inputs are received, the EDB Postgres Advanced Server must behave in a predictable and documented manner that reflects organizational and system objectives.
- V-213636 Medium Security-relevant software updates to the EDB Postgres Advanced Server must be installed within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
- V-213637 Medium The EDB Postgres Advanced Server must generate audit records when security objects are accessed.
- V-213638 Medium The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to access security objects occur.
- V-213639 Medium The DBMS must generate audit records when categories of information (e.g., classification levels/security levels) are accessed.
- V-213640 Medium Audit records must be generated when unsuccessful attempts to access categorized information (e.g., classification levels/security levels) occur.
- V-213641 Medium The EDB Postgres Advanced Server must generate audit records when privileges/permissions are added.
- V-213642 Medium The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to add privileges/permissions occur.
- V-213643 Medium The EDB Postgres Advanced Server must generate audit records when security objects are modified.
- V-213644 Medium The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to modify security objects occur.
- V-213645 Medium Audit records must be generated when categorized information (e.g., classification levels/security levels) is created.
- V-213646 Medium Audit records must be generated when categorized information (e.g., classification levels/security levels) is modified.
- V-213647 Medium Audit records must be generated when unsuccessful attempts to create categorized information (e.g., classification levels/security levels) occur.
- V-213648 Medium Audit records must be generated when unsuccessful attempts to modify categorized information (e.g., classification levels/security levels) occur.
- V-213649 Medium The EDB Postgres Advanced Server must generate audit records when privileges/permissions are deleted.
- V-213650 Medium The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to delete privileges/permissions occur.
- V-213651 Medium The EDB Postgres Advanced Server must generate audit records when security objects are deleted.
- V-213652 Medium The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to delete security objects occur.
- V-213653 Medium Audit records must be generated when categorized information (e.g., classification levels/security levels) is deleted.
- V-213654 Medium Audit records must be generated when unsuccessful attempts to delete categorized information (e.g., classification levels/security levels) occur.
- V-213655 Medium The EDB Postgres Advanced Server must generate audit records when successful logons or connections occur.
- V-213656 Medium The EDB Postgres Advanced Server must generate audit records when unsuccessful logons or connection attempts occur.
- V-213657 Medium The EDB Postgres Advanced Server must generate audit records for all privileged activities or other system-level access.
- V-213658 Medium The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.
- V-213659 Medium The EDB Postgres Advanced Server must generate audit records showing starting and ending time for user access to the database(s).
- V-213660 Medium The EDB Postgres Advanced Server must generate audit records when concurrent logons/connections by the same user from different workstations occur.
- V-213661 Medium The EDB Postgres Advanced Server must be able to generate audit records when successful accesses to objects occur.
- V-213662 Medium The EDB Postgres Advanced Server must generate audit records when unsuccessful accesses to objects occur.
- V-213663 Medium The EDB Postgres Advanced Server must generate audit records for all direct access to the database(s).
- V-213664 High The EDB Postgres Advanced Server must implement NIST FIPS 140-2 validated cryptographic modules to provision digital signatures.
- V-213665 High The EDB Postgres Advanced Server must implement NIST FIPS 140-2 validated cryptographic modules to generate and validate cryptographic hashes.
- V-213666 High The EDB Postgres Advanced Server must implement NIST FIPS 140-2 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the requirements of the data owner.
- V-213667 Medium The EDB Postgres Advanced Server must off-load audit data to a separate log management facility; this must be continuous and in near real time for systems with a network connection to the storage facility and weekly or more often for stand-alone systems.
- V-213668 High The EDB Postgres Advanced Server must be configured on a platform that has a NIST certified FIPS 140-2 installation of OpenSSL.
Removed rules 108
- V-68875 Medium The EDB Postgres Advanced Server must limit the number of concurrent sessions to an organization-defined number per user for all accounts and/or account types.
- V-68877 Medium The EDB Postgres Advanced Server must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.
- V-68879 Medium The EDB Postgres Advanced Server must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
- V-68881 Medium The EDB Postgres Advanced Server must protect against a user falsely repudiating having performed organization-defined actions.
- V-68883 Medium The EDB Postgres Advanced Server must provide audit record generation capability for DoD-defined auditable events within all EDB Postgres Advanced Server/database components.
- V-68885 Medium The EDB Postgres Advanced Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
- V-68887 Medium The EDB Postgres Advanced Server must generate audit records when privileges/permissions are retrieved.
- V-68889 Medium The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.
- V-68891 Medium The EDB Postgres Advanced Server must initiate support of session auditing upon startup.
- V-68895 Medium The EDB Postgres Advanced Server must produce audit records containing sufficient information to establish what type of events occurred.
- V-68897 Medium The EDB Postgres Advanced Server must produce audit records containing time stamps to establish when the events occurred.
- V-68899 Medium The EDB Postgres Advanced Server must produce audit records containing sufficient information to establish where the events occurred.
- V-68901 Medium The EDB Postgres Advanced Server must produce audit records containing sufficient information to establish the sources (origins) of the events.
- V-68903 Medium The EDB Postgres Advanced Server must produce audit records containing sufficient information to establish the outcome (success or failure) of the events.
- V-68905 Medium The EDB Postgres Advanced Server must produce audit records containing sufficient information to establish the identity of any user/subject or process associated with the event.
- V-68907 Medium The EDB Postgres Advanced Server must include additional, more detailed, organization-defined information in the audit records for audit events identified by type, location, or subject.
- V-68909 Medium The EDB Postgres Advanced Server must by default shut down upon audit failure, to include the unavailability of space for more audit log records; or must be configurable to shut down upon audit failure.
- V-68911 High The EDB Postgres Advanced Server must be configurable to overwrite audit log records, oldest first (First-In-First-Out - FIFO), in the event of unavailability of space for more audit log records.
- V-68913 Medium The audit information produced by the EDB Postgres Advanced Server must be protected from unauthorized read access.
- V-68915 Medium The audit information produced by the EDB Postgres Advanced Server must be protected from unauthorized modification.
- V-68917 Medium The audit information produced by the EDB Postgres Advanced Server must be protected from unauthorized deletion.
- V-68919 Medium The EDB Postgres Advanced Server must protect its audit features from unauthorized access.
- V-68921 Medium The EDB Postgres Advanced Server must protect its audit configuration from unauthorized modification.
- V-68923 Medium The EDB Postgres Advanced Server must protect its audit features from unauthorized removal.
- V-68925 Medium Software, applications, and configuration files that are part of, or related to, the Postgres Plus Advanced Server installation must be monitored to discover unauthorized changes.
- V-68927 Medium EDB Postgres Advanced Server software modules, to include stored procedures, functions and triggers must be monitored to discover unauthorized changes.
- V-68929 Medium The EDB Postgres Advanced Server software installation account must be restricted to authorized users.
- V-68931 Medium Database software, including EDB Postgres Advanced Server configuration files, must be stored in dedicated directories, separate from the host OS and other applications.
- V-68933 Medium Database objects (including but not limited to tables, indexes, storage, stored procedures, functions, triggers, links to software external to the EDB Postgres Advanced Server, etc.) must be owned by database/EDB Postgres Advanced Server principals authorized for ownership.
- V-68935 Medium The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to the EDB Postgres Advanced Server, etc.) must be restricted to authorized users.
- V-68937 Medium Default, demonstration and sample databases, database objects, and applications must be removed.
- V-68939 Medium Unused database components, EDB Postgres Advanced Server software, and database objects must be removed.
- V-68941 Medium Unused database components which are integrated in the EDB Postgres Advanced Server and cannot be uninstalled must be disabled.
- V-68943 Medium Access to external executables must be disabled or restricted.
- V-68945 Medium The EDB Postgres Advanced Server must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
- V-68947 Medium If passwords are used for authentication, the EDB Postgres Advanced Server must store only hashed, salted representations of passwords.
- V-68949 Medium If passwords are used for authentication, the EDB Postgres Advanced Server must transmit only encrypted representations of passwords.
- V-68951 Medium The EDB Postgres Advanced Server, when utilizing PKI-based authentication, must validate certificates by performing RFC 5280-compliant certification path validation.
- V-68953 High The EDB Postgres Advanced Server must enforce authorized access to all PKI private keys stored/utilized by the EDB Postgres Advanced Server.
- V-68955 High Applications must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
- V-68957 High When using command-line tools such as psql, users must use a logon method that does not expose the password.
- V-68959 High The EDB Postgres Advanced Server must use NIST FIPS 140-2 validated cryptographic modules for cryptographic operations.
- V-68961 Medium The EDB Postgres Advanced Server must protect the confidentiality and integrity of all information at rest.
- V-68963 Medium The EDB Postgres Advanced Server must isolate security functions from non-security functions.
- V-68965 Medium Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.
- V-68967 Medium Access to database files must be limited to relevant processes and to authorized, administrative users.
- V-68969 Medium The EDB Postgres Advanced Server must check the validity of all data inputs except those specifically identified by the organization.
- V-68971 Medium The EDB Postgres Advanced Server and associated applications must reserve the use of dynamic code execution for situations that require it.
- V-68973 Medium The EDB Postgres Advanced Server and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.
- V-68975 Medium The EDB Postgres Advanced Server must provide non-privileged users with error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
- V-68977 Medium The EDB Postgres Advanced Server must reveal detailed error messages only to the ISSO, ISSM, SA and DBA.
- V-68979 Medium The EDB Postgres Advanced Server must automatically terminate a user session after organization-defined conditions or trigger events requiring session disconnect.
- V-68981 Medium The EDB Postgres Advanced Server must associate organization-defined types of security labels having organization-defined security label values with information in storage.
- V-68983 Medium The EDB Postgres Advanced Server must associate organization-defined types of security labels having organization-defined security label values with information in process.
- V-68985 Medium The EDB Postgres Advanced Server must associate organization-defined types of security labels having organization-defined security label values with information in transmission.
- V-68987 Medium The EDB Postgres Advanced Server must prevent non-privileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
- V-68989 Medium Execution of software modules (to include stored procedures, functions, and triggers) with elevated privileges must be restricted to necessary cases only.
- V-68991 Medium Execution of software modules (to include stored procedures, functions, and triggers) with elevated privileges must be restricted to necessary cases only.
- V-68993 Medium The EDB Postgres Advanced Server must utilize centralized management of the content captured in audit records generated by all components of the EDB Postgres Advanced Server.
- V-68995 Medium The EDB Postgres Advanced Server must provide centralized configuration of the content to be captured in audit records generated by all components of the EDB Postgres Advanced Server.
- V-68997 Medium The EDB Postgres Advanced Server must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
- V-68999 Medium The EDB Postgres Advanced Server must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75% of maximum audit record storage capacity.
- V-69001 Medium The EDB Postgres Advanced Server must provide an immediate real-time alert to appropriate support staff of all audit log failures.
- V-69003 Medium The EDB Postgres Advanced Server must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.
- V-69005 Medium The EDB Postgres Advanced Server must enforce access restrictions associated with changes to the configuration of the EDB Postgres Advanced Server or database(s).
- V-69007 Medium The EDB Postgres Advanced Server must produce audit records of its enforcement of access restrictions associated with changes to the configuration of the EDB Postgres Advanced Server or database(s).
- V-69009 Medium The EDB Postgres Advanced Server must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.
- V-69011 Medium The EDB Postgres Advanced Server must require users to re-authenticate when organization-defined circumstances or situations require re-authentication.
- V-69013 Medium The EDB Postgres Advanced Server must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs) for the establishment of all encrypted sessions.
- V-69015 Medium The EDB Postgres Advanced Server must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest (to include, at a minimum, PII and classified information) on organization-defined information system components.
- V-69017 Medium The EDB Postgres Advanced Server must implement cryptographic mechanisms preventing the unauthorized disclosure of organization-defined information at rest on organization-defined information system components.
- V-69019 Medium The EDB Postgres Advanced Server must maintain the confidentiality and integrity of information during preparation for transmission.
- V-69021 Medium The EDB Postgres Advanced Server must maintain the confidentiality and integrity of information during reception.
- V-69023 Medium When invalid inputs are received, the EDB Postgres Advanced Server must behave in a predictable and documented manner that reflects organizational and system objectives.
- V-69025 Medium Security-relevant software updates to the EDB Postgres Advanced Server must be installed within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
- V-69027 Medium The EDB Postgres Advanced Server must generate audit records when security objects are accessed.
- V-69029 Medium The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to access security objects occur.
- V-69031 Medium The DBMS must generate audit records when categories of information (e.g., classification levels/security levels) are accessed.
- V-69033 Medium Audit records must be generated when unsuccessful attempts to access categorized information (e.g., classification levels/security levels) occur.
- V-69035 Medium The EDB Postgres Advanced Server must generate audit records when privileges/permissions are added.
- V-69037 Medium The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to add privileges/permissions occur.
- V-69039 Medium The EDB Postgres Advanced Server must generate audit records when security objects are modified.
- V-69041 Medium The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to modify security objects occur.
- V-69043 Medium Audit records must be generated when categorized information (e.g., classification levels/security levels) is created.
- V-69045 Medium Audit records must be generated when unsuccessful attempts to create categorized information (e.g., classification levels/security levels) occur.
- V-69047 Medium The EDB Postgres Advanced Server must generate audit records when privileges/permissions are deleted.
- V-69049 Medium The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to delete privileges/permissions occur.
- V-69051 Medium The EDB Postgres Advanced Server must generate audit records when security objects are deleted.
- V-69053 Medium The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to delete security objects occur.
- V-69055 Medium Audit records must be generated when categorized information (e.g., classification levels/security levels) is deleted.
- V-69057 Medium Audit records must be generated when unsuccessful attempts to delete categorized information (e.g., classification levels/security levels) occur.
- V-69059 Medium The EDB Postgres Advanced Server must generate audit records when successful logons or connections occur.
- V-69061 Medium The EDB Postgres Advanced Server must generate audit records when unsuccessful logons or connection attempts occur.
- V-69063 Medium The EDB Postgres Advanced Server must generate audit records for all privileged activities or other system-level access.
- V-69065 Medium The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.
- V-69067 Medium The EDB Postgres Advanced Server must generate audit records showing starting and ending time for user access to the database(s).
- V-69069 Medium The EDB Postgres Advanced Server must generate audit records when concurrent logons/connections by the same user from different workstations occur.
- V-69071 Medium The EDB Postgres Advanced Server must be able to generate audit records when successful accesses to objects occur.
- V-69073 Medium The EDB Postgres Advanced Server must generate audit records when unsuccessful accesses to objects occur.
- V-69075 Medium The EDB Postgres Advanced Server must generate audit records for all direct access to the database(s).
- V-69077 High The EDB Postgres Advanced Server must implement NIST FIPS 140-2 validated cryptographic modules to provision digital signatures.
- V-69079 High The EDB Postgres Advanced Server must implement NIST FIPS 140-2 validated cryptographic modules to generate and validate cryptographic hashes.
- V-69081 High The EDB Postgres Advanced Server must implement NIST FIPS 140-2 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the requirements of the data owner.
- V-69083 Medium The EDB Postgres Advanced Server must off-load audit data to a separate log management facility; this must be continuous and in near real time for systems with a network connection to the storage facility and weekly or more often for stand-alone systems.
- V-69085 High The EDB Postgres Advanced Server must be configured on a platform that has a NIST certified FIPS 140-2 installation of OpenSSL.
- V-69087 Medium Audit records must be generated when categorized information (e.g., classification levels/security levels) is modified.
- V-69089 Medium Audit records must be generated when unsuccessful attempts to modify categorized information (e.g., classification levels/security levels) occur.
- V-69091 Medium The EDB Postgres Advanced Server must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- PPS9-00-000100
- Vuln IDs
-
- V-213561
- V-68875
- Rule IDs
-
- SV-213561r508024_rule
- SV-83479
Checks: C-14783r289995_chk
Determine whether the system documentation specifies limits on the number of concurrent DBMS sessions per account by type of user. If it does not, assume a limit of 10 for database administrators and 2 for all other users. Execute the following SQL as enterprisedb: SELECT rolname, rolconnlimit FROM pg_roles; If rolconnlimit is -1 or larger than the system documentation limits for any rolname, this is a finding.
Fix: F-14781r289996_fix
Execute the following SQL as enterprisedb: SELECT rolname, rolconnlimit FROM pg_roles; For any roles where rolconnlimit is -1 or larger than the system documentation limits, execute this SQL as enterprisedb:. ALTER USER <role> WITH CONNECTION LIMIT <desired connection limit>;
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- PPS9-00-000700
- Vuln IDs
-
- V-213562
- V-68877
- Rule IDs
-
- SV-213562r508024_rule
- SV-83481
Checks: C-14784r289998_chk
Verify that pg_hba.conf is not using: “trust”, “md5”, or “password” as allowable access methods. > cat <postgresql data directory>/pg_hba.conf | egrep –I ‘(trust|md5|password)’ | grep –v ‘#’ If any output is produced, verify the users are documented as being authorized to use one of these access methods. If the users are not authorized to use these access methods, this is a finding. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
Fix: F-14782r289999_fix
Identify any user that is using “trust”, “md5”, or “password” as allowable access methods. > cat <postgresql data directory>/pg_hba.conf | egrep –I ‘(trust|md5|password)’ | grep –v ‘#’ Document any rows that have "trust", "md5", or "password" specified for the "METHOD" column and obtain appropriate approval for each user specified in the "USER" column (i.e., all DBMS managed accounts). For any users that are not documented and approved as DBMS managed accounts, change the "METHOD" column to one of the externally managed (not "trust", "md5", or "password") options defined here: http://www.postgresql.org/docs/9.5/static/auth-methods.html (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- PPS9-00-000800
- Vuln IDs
-
- V-213563
- V-68879
- Rule IDs
-
- SV-213563r508024_rule
- SV-83483
Checks: C-14785r290001_chk
Review the system documentation to determine the required levels of protection for DBMS server securables by type of login. Review the permissions actually in place on the server. If the actual permissions do not match the documented requirements, this is a finding.
Fix: F-14783r290002_fix
Use GRANT, REVOKE, ALTER statements to add and remove permissions on server-level securables, bringing them into line with the documented requirements.
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- PPS9-00-000900
- Vuln IDs
-
- V-213564
- V-68881
- Rule IDs
-
- SV-213564r508024_rule
- SV-83485
Checks: C-14786r290004_chk
Execute the following SQL as enterprisedb: SHOW edb_audit; If the result is not "csv" or "xml", this is a finding.
Fix: F-14784r290005_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit = csv; SELECT pg_reload_conf(); or ALTER SYSTEM SET edb_audit = xml; SELECT pg_reload_conf();
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- PPS9-00-001000
- Vuln IDs
-
- V-213565
- V-68883
- Rule IDs
-
- SV-213565r508024_rule
- SV-83487
Checks: C-14787r290007_chk
Execute the following SQL as enterprisedb: SHOW edb_audit; If the result is not "csv" or "xml", this is a finding.
Fix: F-14785r290008_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit = csv; SELECT pg_reload_conf(); or ALTER SYSTEM SET edb_audit = xml; SELECT pg_reload_conf();
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000171
- Version
- PPS9-00-001100
- Vuln IDs
-
- V-213566
- V-68885
- Rule IDs
-
- SV-213566r508024_rule
- SV-83489
Checks: C-14788r290010_chk
Run the command "ls -al <postgresql data directory>/postgresql*.conf" to show file permissions. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) If the files are not owned by enterprisedb(user)/enterprisedb(group) or does not have RW permission for the user only, this is a finding.
Fix: F-14786r290011_fix
Run these commands: 1) "chown enterprisedb <postgresql data directory>/postgresql*.conf" 2) "chgrp enterprisedb <postgresql data directory>/postgresql*.conf" 3) "chmod 600 <postgresql data directory>/postgresql*.conf" (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-001200
- Vuln IDs
-
- V-213567
- V-68887
- Rule IDs
-
- SV-213567r508024_rule
- SV-83491
Checks: C-14789r290013_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14787r290014_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-001300
- Vuln IDs
-
- V-213568
- V-68889
- Rule IDs
-
- SV-213568r508024_rule
- SV-83493
Checks: C-14790r290016_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14788r290017_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- PPS9-00-001400
- Vuln IDs
-
- V-213569
- V-68891
- Rule IDs
-
- SV-213569r508024_rule
- SV-83495
Checks: C-14791r290019_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14789r290020_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- PPS9-00-001600
- Vuln IDs
-
- V-213570
- V-68895
- Rule IDs
-
- SV-213570r508024_rule
- SV-83499
Checks: C-14792r290022_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14790r290023_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- PPS9-00-001700
- Vuln IDs
-
- V-213571
- V-68897
- Rule IDs
-
- SV-213571r508024_rule
- SV-83501
Checks: C-14793r290025_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14791r290026_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- PPS9-00-001800
- Vuln IDs
-
- V-213572
- V-68899
- Rule IDs
-
- SV-213572r508024_rule
- SV-83503
Checks: C-14794r290028_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14792r290029_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- PPS9-00-001900
- Vuln IDs
-
- V-213573
- V-68901
- Rule IDs
-
- SV-213573r508024_rule
- SV-83505
Checks: C-14795r290031_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14793r290032_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- PPS9-00-002000
- Vuln IDs
-
- V-213574
- V-68903
- Rule IDs
-
- SV-213574r508024_rule
- SV-83507
Checks: C-14796r290034_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14794r290035_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- PPS9-00-002100
- Vuln IDs
-
- V-213575
- V-68905
- Rule IDs
-
- SV-213575r508024_rule
- SV-83509
Checks: C-14797r290037_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14795r290038_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- PPS9-00-002200
- Vuln IDs
-
- V-213576
- V-68907
- Rule IDs
-
- SV-213576r508024_rule
- SV-83511
Checks: C-14798r290040_chk
Review the system documentation to identify what additional information the organization has determined necessary. Check application and database design, and existing audit records to verify that all organization-defined additional, more detailed information is in the audit records for audit events identified by type, location, or subject. If any additional information is defined and is not included in the audit records, this is a finding.
Fix: F-14796r290041_fix
Execute the following SQL to set additional detailed information for the audit records in the session: set edb_audit_tag = '<information>'; Replace <information> with a character string holding the additional data that must be captured. To set this in a trigger, an example is included below. Keep in mind that the edb_audit_tag is set for the life of the session, not just the life of the insert command: CREATE OR REPLACE FUNCTION add_audit_info() RETURNS trigger AS $BODY$ BEGIN SET edb_audit_tag = '<information>'; RETURN NEW; END; $BODY$ LANGUAGE plpgsql; CREATE TRIGGER add_audit_info_trigger BEFORE INSERT ON <table> FOR EACH ROW EXECUTE PROCEDURE add_audit_info();
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- PPS9-00-002300
- Vuln IDs
-
- V-213577
- V-68909
- Rule IDs
-
- SV-213577r508024_rule
- SV-83513
Checks: C-14799r290043_chk
If Postgres Enterprise Manager (PEM) is not installed and configured to shut down the database when the audit log is full, this is a finding.
Fix: F-14797r290044_fix
Install PEM and configure an alert to shut down the PPAS server when the audit log mount point is at 99 percent full. Refer to the Supplemental Procedures document, supplied with this STIG, for guidance on configuring alerts.
- RMF Control
- AU-5
- Severity
- H
- CCI
- CCI-000140
- Version
- PPS9-00-002400
- Vuln IDs
-
- V-213578
- V-68911
- Rule IDs
-
- SV-213578r508024_rule
- SV-83515
Checks: C-14800r290046_chk
If an externally managed and monitored partition or logical volume that can be grown dynamically is being used for logging, this is not a finding. If PPAS is auditing to a directory that is not being actively checked for availability of disk space, and if logrotate is not configured to rotate logs based on the size of the audit log directory with oldest logs being replaced by newest logs, this is a finding.
Fix: F-14798r290047_fix
Determine the max size of your audit log directory. For this fix, we will assume that the audit log directory has a max size of 100MB. Divide the max size of the directory by 10 to determine the size of your log files for rotation. Perform the following steps to ensure that the audit log directory is never more than 90% full and new logs always replace the oldest logs: 1) Add the following to the bottom of the /etc/logrotate.conf file: <postgresql data directory>/edb_audit/audit.csv { size 10M dateext dateformat .%Y-%m-%d.%s copytruncate rotate 8 } (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) 2) Create the file /etc/cron.hourly/logrotate with these contents: #!/bin/sh /usr/sbin/logrotate /etc/logrotate.conf EXITVALUE=$? if [ $EXITVALUE != 0 ]; then /usr/bin/logger -t logrotate "ALERT exited abnormally with [$EXITVALUE]" fi exit 0 3) Issue these SQL statements: ALTER SYSTEM SET edb_audit_filename = 'audit'; SELECT pg_reload_conf();
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- PPS9-00-002600
- Vuln IDs
-
- V-213579
- V-68913
- Rule IDs
-
- SV-213579r508024_rule
- SV-83517
Checks: C-14801r290049_chk
Verify User ownership, Group ownership, and permissions on the “edb_audit” directory: > ls –ald <postgresql data directory>/edb_audit If the User owner is not “enterprisedb”, this is a finding If the Group owner is not “enterprisedb”, this is a finding. If the directory is more permissive than 700, this is a finding. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
Fix: F-14799r290050_fix
Run these commands: 1) "chown enterprisedb <postgresql data directory>/edb_audit" 2) "chgrp enterprisedb <postgresql data directory>/edb_audit" 3) "chmod 700 <postgresql data directory>/edb_audit" (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- PPS9-00-002700
- Vuln IDs
-
- V-213580
- V-68915
- Rule IDs
-
- SV-213580r508024_rule
- SV-83519
Checks: C-14802r290052_chk
Verify User ownership, Group ownership, and permissions on the “edb_audit” directory: > ls –ald <postgresql data directory>/edb_audit If the User owner is not “enterprisedb”, this is a finding If the Group owner is not “enterprisedb”, this is a finding. If the directory is more permissive than 700, this is a finding. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
Fix: F-14800r290053_fix
Run these commands: 1) "chown enterprisedb <postgresql data directory>/edb_audit" 2) "chgrp enterprisedb <postgresql data directory>/edb_audit" 3) "chmod 700 <postgresql data directory>/edb_audit" (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- PPS9-00-002800
- Vuln IDs
-
- V-213581
- V-68917
- Rule IDs
-
- SV-213581r508024_rule
- SV-83521
Checks: C-14803r290055_chk
Verify User ownership, Group ownership, and permissions on the “edb_audit” directory: > ls –ald <postgresql data directory>/edb_audit If the User owner is not “enterprisedb”, this is a finding If the Group owner is not “enterprisedb”, this is a finding. If the directory is more permissive than 700, this is a finding. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
Fix: F-14801r290056_fix
Run these commands: 1) "chown enterprisedb <postgresql data directory>/edb_audit" 2) "chgrp enterprisedb <postgresql data directory>/edb_audit" 3) "chmod 700 <postgresql data directory>/edb_audit" (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- PPS9-00-002900
- Vuln IDs
-
- V-213582
- V-68919
- Rule IDs
-
- SV-213582r508024_rule
- SV-83523
Checks: C-14804r290058_chk
Verify User ownership, Group ownership, and permissions on the “edb_audit” directory: > ls –ald <postgresql data directory>/edb_audit If the User owner is not “enterprisedb”, this is a finding If the Group owner is not “enterprisedb”, this is a finding. If the directory is more permissive than 700, this is a finding. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
Fix: F-14802r290059_fix
Run these commands: 1) "chown enterprisedb <postgresql data directory>/edb_audit" 2) "chgrp enterprisedb <postgresql data directory>/edb_audit" 3) "chmod 700 <postgresql data directory>/edb_audit" (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- PPS9-00-003000
- Vuln IDs
-
- V-213583
- V-68921
- Rule IDs
-
- SV-213583r508024_rule
- SV-83525
Checks: C-14805r290061_chk
Verify User ownership, Group ownership, and permissions on the “edb_audit” directory: > ls –ald <postgresql data directory>/edb_audit If the User owner is not “enterprisedb”, this is a finding If the Group owner is not “enterprisedb”, this is a finding. If the directory is more permissive than 700, this is a finding. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
Fix: F-14803r290062_fix
Run these commands: 1) "chown enterprisedb <postgresql data directory>/edb_audit" 2) "chgrp enterprisedb <postgresql data directory>/edb_audit" 3) "chmod 700 <postgresql data directory>/edb_audit" (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001495
- Version
- PPS9-00-003100
- Vuln IDs
-
- V-213584
- V-68923
- Rule IDs
-
- SV-213584r508024_rule
- SV-83527
Checks: C-14806r290064_chk
Verify User ownership, Group ownership, and permissions on the “edb_audit” directory: > ls –ald <postgresql data directory>/edb_audit If the User owner is not “enterprisedb”, this is a finding If the Group owner is not “enterprisedb”, this is a finding. If the directory is more permissive than 700, this is a finding. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
Fix: F-14804r290065_fix
Run these commands: 1) "chown enterprisedb <postgresql data directory>/edb_audit" 2) "chgrp enterprisedb <postgresql data directory>/edb_audit" 3) "chmod 700 <postgresql data directory>/edb_audit" (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- PPS9-00-003200
- Vuln IDs
-
- V-213585
- V-68925
- Rule IDs
-
- SV-213585r508024_rule
- SV-83529
Checks: C-14807r290067_chk
Review monitoring procedures and implementation evidence to verify monitoring of changes to database software libraries, related applications, and configuration files is done. Verify the list of files and directories being monitored is complete. If monitoring does not occur or is not complete, this is a finding.
Fix: F-14805r290068_fix
Implement procedures to monitor for unauthorized changes to DBMS software libraries, related software application libraries, and configuration files. If a third-party automated tool is not employed, an automated job that reports file information on the directories and files of interest and compares them to the baseline report for the same will meet the requirement. Use file hashes or checksums for comparisons, as file dates may be manipulated by malicious users.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- PPS9-00-003210
- Vuln IDs
-
- V-213586
- V-68927
- Rule IDs
-
- SV-213586r508024_rule
- SV-83531
Checks: C-14808r290070_chk
Check the EDB Postgres configuration for a timed job that automatically checks all system and user-defined procedures, functions and triggers for being modified by running the following EDB Postgres query: select job, what from ALL_JOBS; (Alternatively, in Postgres Enterprise Manager, navigate to the "Jobs" node of the database and examine the job from there.) If a timed job or some other method is not implemented to check for Triggers being modified, this is a finding.
Fix: F-14806r290071_fix
Configure an EDB Postgres timed job that automatically checks all system and user-defined procedures, functions and triggers for being modified, and in the event of such changes informs the proper personnel for evaluation and possible action.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- PPS9-00-003300
- Vuln IDs
-
- V-213587
- V-68929
- Rule IDs
-
- SV-213587r508024_rule
- SV-83533
Checks: C-14809r290073_chk
Review procedures for controlling, granting access to, and tracking use of the DBMS software installation account. If access or use of this account is not restricted to the minimum number of personnel required or if unauthorized access to the account has been granted, this is a finding.
Fix: F-14807r290074_fix
Develop, document, and implement procedures to restrict and track use of the DBMS software installation account.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- PPS9-00-003400
- Vuln IDs
-
- V-213588
- V-68931
- Rule IDs
-
- SV-213588r508024_rule
- SV-83535
Checks: C-14810r290076_chk
Review the DBMS software library directory and note other root directories located on the same disk directory or any subdirectories. If any non-DBMS software directories exist on the disk directory, examine or investigate their use. If any of the directories are used by other applications, including third-party applications that use the DBMS, this is a finding. Only applications that are required for the functioning and administration, not use, of the DBMS should be located in the same disk directory as the DBMS software libraries. If other applications are located in the same directory as the DBMS, this is a finding.
Fix: F-14808r290077_fix
Install all applications on directories separate from the DBMS software library directory. Relocate any directories or reinstall other application software that currently shares the DBMS software library directory.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- PPS9-00-003500
- Vuln IDs
-
- V-213589
- V-68933
- Rule IDs
-
- SV-213589r508024_rule
- SV-83537
Checks: C-14811r290079_chk
Review system documentation to identify accounts authorized to own database objects. Review accounts that own objects in the database(s) by running this SQL command: select * from sys.all_objects; If any database objects are found to be owned by users not authorized to own database objects, this is a finding.
Fix: F-14809r290080_fix
Assign ownership of authorized objects to authorized object owner accounts by running this SQL command for each object to be changed: ALTER <type> <object name> OWNER TO <new owner>; For example: ALTER TABLE my_table OWNER TO APP_USER;
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- PPS9-00-003600
- Vuln IDs
-
- V-213590
- V-68935
- Rule IDs
-
- SV-213590r508024_rule
- SV-83539
Checks: C-14812r290082_chk
Use psql to connect to the db as enterprisedb and run this command: \dp *.* If any unauthorized roles have unauthorized accesses, this is a finding. Definitions of the access privileges are defined here: http://www.postgresql.org/docs/current/static/sql-grant.html
Fix: F-14810r290083_fix
Revoke unauthorized privileges. The syntax is: REVOKE <privilege> ON <object> FROM <role>. Example: REVOKE INSERT ON a FROM PUBLIC; See PostgreSQL documentation for details.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- PPS9-00-003700
- Vuln IDs
-
- V-213591
- V-68937
- Rule IDs
-
- SV-213591r508024_rule
- SV-83541
Checks: C-14813r290085_chk
Review vendor documentation and vendor websites for vendor-provided demonstration or sample databases, database applications, objects, and files. Review the DBMS to determine if any of the demonstration and sample databases, database applications, or files are installed in the database or are included with the DBMS application. If any are present in the database or are included with the DBMS application, this is a finding. Check for the existence of EDB Postgres sample databases: postgres and edb. Execute the following SQL as enterprisedb: SELECT datname FROM pg_database WHERE datistemplate = false; If any databases are listed here that are not used by the application, this is a finding.
Fix: F-14811r290086_fix
Remove any unused sample databases from the DBMS. To remove a database, execute the follow SQL: DROP DATABASE <database>;
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- PPS9-00-003800
- Vuln IDs
-
- V-213592
- V-68939
- Rule IDs
-
- SV-213592r508024_rule
- SV-83543
Checks: C-14814r290088_chk
Review the list of components and features installed with the database. If unused components are installed and are not documented and authorized, this is a finding. RPM can also be used to check to see what is installed: yum list installed | grep ppas This returns EDB database packages that have been installed. If any packages displayed by this command are not being used, this is a finding.
Fix: F-14812r290089_fix
If any components are required for operation of applications that will be accessing the DBMS, include them in the system documentation. To uninstall and unused package (using ppas-odbc-devel-09.03.0400.02-1.rhel7.x86_64 as an example), execute the following command as root: yum erase -y ppas-odbc-devel-09.03.0400.02-1.rhel7.x86_64
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- PPS9-00-003900
- Vuln IDs
-
- V-213593
- V-68941
- Rule IDs
-
- SV-213593r508024_rule
- SV-83545
Checks: C-14815r290091_chk
Run the following command as root: yum list installed | grep ppas If any packages are installed that are not needed, this is a finding.
Fix: F-14813r290092_fix
Review the EDB PPAS packages available in the installation guide here: http://www.enterprisedb.com/docs/en/9.5/instguide/Postgres_Plus_Advanced_Server_Installation_Guide.1.14.html# Uninstall any unneeded packages by running the following as root: yum erase -y <package-name> At a minimum, the ppas94-server-* packages are required, but other packages such as jdbc, postgis, pgpool and others may be required by applications that need the functionality provided in these additional packages
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- PPS9-00-004000
- Vuln IDs
-
- V-213594
- V-68943
- Rule IDs
-
- SV-213594r508024_rule
- SV-83547
Checks: C-14816r290094_chk
Run the following command as root: yum list installed | grep ppas If any packages are installed that are not needed, this is a finding.
Fix: F-14814r290095_fix
Review the EDB PPAS packages available in the installation guide here: http://www.enterprisedb.com/docs/en/9.5/instguide/Postgres_Plus_Advanced_Server_Installation_Guide.1.14.html# Uninstall any unneeded packages by running the following as root: #> yum erase -y <package-name> At a minimum, the ppas94-server-* packages are required, but other packages such as jdbc, postgis, pgpool and others may be required by applications that need the functionality provided in these additional packages
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- PPS9-00-004100
- Vuln IDs
-
- V-213595
- V-68945
- Rule IDs
-
- SV-213595r508024_rule
- SV-83549
Checks: C-14817r290097_chk
Execute the following SQL as enterprisedb: SHOW port; SHOW listen_addresses; If the port or addresses are not approved, this is a finding.
Fix: F-14815r290098_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET port = <port>; ALTER SYSTEM SET listen_addresses = <comma separated addresses>; Execute the following operating system command as root: systemctl restart ppas-9.5.service
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- PPS9-00-004200
- Vuln IDs
-
- V-213596
- V-69091
- Rule IDs
-
- SV-213596r508024_rule
- SV-83695
Checks: C-14818r290100_chk
Open "<postgresql data directory>/pg_hba.conf" in a viewer or editor. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) If any rows have "trust" specified for the "METHOD" column, this is a finding.
Fix: F-14816r290101_fix
Open "<postgresql data directory>/pg_hba.conf" in an editor. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) If any rows have "trust" specified for the "METHOD" column, delete the rows or change them to other authentication methods. Permitted methods in preferred order are: peer (local only), cert, ldap, sspi, pam, md5
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- PPS9-00-004300
- Vuln IDs
-
- V-213597
- V-68947
- Rule IDs
-
- SV-213597r508024_rule
- SV-83551
Checks: C-14819r290103_chk
Execute the following SQL as enterprisedb: SHOW password_encryption; If the value is not "on", this is a finding.
Fix: F-14817r290104_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET password_encryption = on; SELECT pg_reload_conf();
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- PPS9-00-004400
- Vuln IDs
-
- V-213598
- V-68949
- Rule IDs
-
- SV-213598r508024_rule
- SV-83553
Checks: C-14820r290106_chk
Open "<postgresql data directory>/pg_hba.conf" in a viewer or editor. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) If any rows have "password" specified for the "METHOD" column, this is a finding.
Fix: F-14818r290107_fix
Open "<postgresql data directory>/pg_hba.conf" in an editor. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) For any rows that have "password" specified for the "METHOD" column, change the value to "md5".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- PPS9-00-004500
- Vuln IDs
-
- V-213599
- V-68951
- Rule IDs
-
- SV-213599r508024_rule
- SV-83555
Checks: C-14821r290109_chk
Open "<postgresql data directory>/pg_hba.conf" in a viewer or editor. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) If any rows have TYPE of "hostssl" but do not include "clientcert=1" in the OPTIONS column at the end of the line, this is a finding.
Fix: F-14819r290110_fix
Open "<postgresql data directory>/pg_hba.conf" in an editor. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) For any rows that have TYPE of "hostssl", append "clientcert=1" in the OPTIONS column at the end of the line.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000186
- Version
- PPS9-00-004600
- Vuln IDs
-
- V-213600
- V-68953
- Rule IDs
-
- SV-213600r508024_rule
- SV-83557
Checks: C-14822r290112_chk
Verify User ownership, Group ownership, and permissions on the “server.key” file: > ls –alL <postgresql data directory>/server.key If the User owner is not “enterprisedb”, this is a finding If the Group owner is not “enterprisedb”, this is a finding. If the file is more permissive than 600, this is a finding. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
Fix: F-14820r290113_fix
Run these commands: 1) "chown enterprisedb <postgresql data directory>/server.key" 2) "chgrp enterprisedb <postgresql data directory>/server.key" 3) "chmod 600 <postgresql data directory>/server.key" (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
- RMF Control
- IA-6
- Severity
- H
- CCI
- CCI-000206
- Version
- PPS9-00-004810
- Vuln IDs
-
- V-213601
- V-68955
- Rule IDs
-
- SV-213601r508024_rule
- SV-83559
Checks: C-14823r290115_chk
Determine whether any applications that access the database allow for entry of the account name and password or PIN. If any do, determine whether these applications obfuscate authentication data. If they do not, this is a finding.
Fix: F-14821r290116_fix
Configure or modify applications to prohibit display of passwords in clear text.
- RMF Control
- IA-6
- Severity
- H
- CCI
- CCI-000206
- Version
- PPS9-00-004820
- Vuln IDs
-
- V-213602
- V-68957
- Rule IDs
-
- SV-213602r508024_rule
- SV-83561
Checks: C-14824r290118_chk
For psql, which cannot be configured not to accept a plain-text password, and any other essential tool with the same limitation, verify that the system documentation explains the need for the tool, who uses it, and any relevant mitigations and that AO approval has been obtained. If not, this is a finding. Request evidence that all users of the tool are trained in the importance of using the "-P" option and not using the plain-text password option and in how to keep the password hidden and that they adhere to this practice. If not, this is a finding.
Fix: F-14822r290119_fix
For psql, which can accept a plain-text password, and any other essential tool with the same limitation: 1) Document the need for it, who uses it, and any relevant mitigations, and obtain AO approval. 2) Train all users of the tool in the importance of not using the plain-text password option and in how to keep the password hidden by using the "-P" option.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- PPS9-00-004900
- Vuln IDs
-
- V-213603
- V-68959
- Rule IDs
-
- SV-213603r508024_rule
- SV-83563
Checks: C-14825r290121_chk
If a FIPS-certified OpenSSL library is not installed and configured, this is a finding. Run this command to ensure that you are running RHEL: "cat /etc/redhat-release" Run this command to see the OpenSSL version: "openssl version" If "/etc/redhat-release" does not show a supported version of Red Hat Enterprise Linux or if the openssl version does not include "-fips" in the version, this is a finding.
Fix: F-14823r290122_fix
There is no known fix for a FIPS-compliant OpenSSL library on Microsoft Windows at this time. Configure RHEL OpenSSL as defined in section 9.1 of the RHEL OpenSSL FIPS Compliance documentation here: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1758.pdf
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- PPS9-00-005700
- Vuln IDs
-
- V-213604
- V-68961
- Rule IDs
-
- SV-213604r508024_rule
- SV-83565
Checks: C-14826r290124_chk
If the application owner and Authorizing Official have determined that encryption of data at rest is NOT required, this is not a finding. Execute the following command as root: > df If the mounted filesystem where "<postgresql data directory>" exists is not located on an encrypted disk partition, this is a finding. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
Fix: F-14824r290125_fix
Create an encrypted partition to host the "<postgresql data directory>" directory. This can be done at the OS level with a technology such as db-crypt or other encryption technologies provided by third-party tools. One option is to use LUKS as documented here: https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Security_Guide/sec-Encryption.html (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- PPS9-00-005800
- Vuln IDs
-
- V-213605
- V-68963
- Rule IDs
-
- SV-213605r508024_rule
- SV-83567
Checks: C-14827r290127_chk
All PPAS built-in security packages are in the sys, pg_catalog, information_schema, and dbo schemas. If any application-specific packages have been added to these schemas, this is a finding.
Fix: F-14825r290128_fix
Remove all application-specific packages that were added to the sys, pg_catalog, information_schema, and dbo schemas.
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- PPS9-00-005900
- Vuln IDs
-
- V-213606
- V-68965
- Rule IDs
-
- SV-213606r508024_rule
- SV-83569
Checks: C-14828r290130_chk
Review the procedures for the refreshing of development/test data from production. Review any scripts or code that exists for the movement of production data to development/test systems or to any other location or for any other purpose. Verify that copies of production data are not left in unprotected locations. If the code that exists for data movement does not comply with the organization-defined data transfer policy and/or fails to remove any copies of production data from unprotected locations, this is a finding.
Fix: F-14826r290131_fix
Modify any code used for moving data from production to development/test systems to comply with the organization-defined data transfer policy and to ensure copies of production data are not left in unsecured locations.
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- PPS9-00-006100
- Vuln IDs
-
- V-213607
- V-68967
- Rule IDs
-
- SV-213607r508024_rule
- SV-83571
Checks: C-14829r290133_chk
Verify User ownership, Group ownership, and permissions on the <postgressql data directory> directory: > ls –ald <postgresql data directory> If the User owner is not “enterprisedb”, this is a finding If the Group owner is not “enterprisedb”, this is a finding. If the directory is more permissive than 700, this is a finding. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
Fix: F-14827r290134_fix
Run these commands: 1) "chown enterprisedb <postgresql data directory>" 2) "chgrp enterprisedb <postgresql data directory>" 3) "chmod 700 <postgresql data directory>" (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- PPS9-00-006200
- Vuln IDs
-
- V-213608
- V-68969
- Rule IDs
-
- SV-213608r508024_rule
- SV-83573
Checks: C-14830r290136_chk
Execute the following SQL as enterprisedb: SELECT * FROM sqlprotect.list_protected_users; If the database and user that handles user input is not listed or if sqlprotect.list_protected_users does not exist (meaning SQL/Protect is not installed), and an alternative means of reviewing for vulnerable code is not in use, this is a finding.
Fix: F-14828r290137_fix
Install and configure SQL/Protect as documented here: http://www.enterprisedb.com/docs/en/9.5/eeguide/Postgres_Plus_Enterprise_Edition_Guide.1.072.html# Alternatively, implement, document, and maintain another method of checking for the validity of inputs.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- PPS9-00-006300
- Vuln IDs
-
- V-213609
- V-68971
- Rule IDs
-
- SV-213609r508024_rule
- SV-83575
Checks: C-14831r290139_chk
Execute the following SQL as enterprisedb: SELECT * FROM sqlprotect.list_protected_users; If the database and user that handles user input is not listed or if sqlprotect.list_protected_users does not exist (meaning SQL/Protect is not installed), and an alternative means of reviewing for vulnerable code is not in use, this is a finding.
Fix: F-14829r290140_fix
Install and configure SQL/Protect as documented here: http://www.enterprisedb.com/docs/en/9.5/eeguide/Postgres_Plus_Enterprise_Edition_Guide.1.072.html# Alternatively, implement, document, and maintain another method of checking for the validity of inputs.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- PPS9-00-006400
- Vuln IDs
-
- V-213610
- V-68973
- Rule IDs
-
- SV-213610r508024_rule
- SV-83577
Checks: C-14832r290142_chk
Execute the following SQL as enterprisedb: SELECT * FROM sqlprotect.list_protected_users; If the database and user that handles user input is not listed or if sqlprotect.list_protected_users does not exist (meaning SQL/Protect is not installed), and an alternative means of reviewing for vulnerable code is not in use, this is a finding.
Fix: F-14830r290143_fix
Install and configure SQL/Protect as documented here: http://www.enterprisedb.com/docs/en/9.5/eeguide/Postgres_Plus_Enterprise_Edition_Guide.1.072.html# Alternatively, implement, document, and maintain another method of checking for the validity of inputs.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- PPS9-00-006500
- Vuln IDs
-
- V-213611
- V-68975
- Rule IDs
-
- SV-213611r508024_rule
- SV-83579
Checks: C-14833r290145_chk
Check custom database code to verify that error messages do not contain information beyond what is needed for troubleshooting the issue. If custom database errors contain PII data, sensitive business data, or information useful for identifying the host system or database structure, this is a finding.
Fix: F-14831r290146_fix
Configure custom database code and associated application code not to divulge sensitive information or information useful for system identification in error messages.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- PPS9-00-006600
- Vuln IDs
-
- V-213612
- V-68977
- Rule IDs
-
- SV-213612r508024_rule
- SV-83581
Checks: C-14834r290148_chk
Check custom database code to determine if detailed error messages are ever displayed to unauthorized individuals. If detailed error messages are displayed to individuals not authorized to view them, this is a finding.
Fix: F-14832r290149_fix
Configure custom database code and associated application code not to display detailed error messages to those not authorized to view them.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- PPS9-00-006700
- Vuln IDs
-
- V-213613
- V-68979
- Rule IDs
-
- SV-213613r508024_rule
- SV-83583
Checks: C-14835r290151_chk
Review system documentation to obtain the organization's definition of circumstances requiring automatic session termination. If the documentation explicitly states that such termination is not required or is prohibited, this is not a finding. If the documentation requires automatic session termination but the DBMS is not configured via triggers, scripts, or other organization-defined manners to terminate sessions when required, this is a finding.
Fix: F-14833r290152_fix
Execute this SQL command in the places where the documentation requires automatic session termination: SELECT pg_terminate_backend(pid) FROM pg_stat_activity WHERE usename = '<username>'
- RMF Control
- AC-16
- Severity
- M
- CCI
- CCI-002262
- Version
- PPS9-00-006900
- Vuln IDs
-
- V-213614
- V-68981
- Rule IDs
-
- SV-213614r508024_rule
- SV-83585
Checks: C-14836r290154_chk
If security labeling is not required, this is not applicable (NA). If security labeling requirements have been specified, execute the following SQL as enterprisedb: SELECT * from ALL_POLICIES where OBJECT_NAME = '<table name>'; If a policy is not enabled for the table requiring security labeling, this is a finding.
Fix: F-14834r290155_fix
Create a row-level policy for all required tables as defined here: http://www.enterprisedb.com/docs/en/9.5/oracompat/Database_Compatibility_for_Oracle_Developers_Guide.1.201.html#pID0E0D5J0HA
- RMF Control
- AC-16
- Severity
- M
- CCI
- CCI-002263
- Version
- PPS9-00-007000
- Vuln IDs
-
- V-213615
- V-68983
- Rule IDs
-
- SV-213615r508024_rule
- SV-83587
Checks: C-14837r290157_chk
If security labeling is not required, this is not applicable (NA). If security labeling requirements have been specified, execute the following SQL as enterprisedb: SELECT * from ALL_POLICIES where OBJECT_NAME = '<table name>'; If a policy is not enabled for the table requiring security labeling, this is a finding.
Fix: F-14835r290158_fix
Create a row-level policy for all required tables as defined here: http://www.enterprisedb.com/docs/en/9.5/oracompat/Database_Compatibility_for_Oracle_Developers_Guide.1.201.html#pID0E0D5J0HA
- RMF Control
- AC-16
- Severity
- M
- CCI
- CCI-002264
- Version
- PPS9-00-007100
- Vuln IDs
-
- V-213616
- V-68985
- Rule IDs
-
- SV-213616r508024_rule
- SV-83589
Checks: C-14838r290160_chk
If security labeling is not required, this is not applicable (NA). If security labeling requirements have been specified, execute the following SQL as enterprisedb: SELECT * from ALL_POLICIES where OBJECT_NAME = '<table name>'; If a policy is not enabled for the table requiring security labeling, this is a finding.
Fix: F-14836r290161_fix
Create a row-level policy for all required tables as defined here: http://www.enterprisedb.com/docs/en/9.5/oracompat/Database_Compatibility_for_Oracle_Developers_Guide.1.201.html#pID0E0D5J0HA
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- PPS9-00-007400
- Vuln IDs
-
- V-213617
- V-68987
- Rule IDs
-
- SV-213617r508024_rule
- SV-83591
Checks: C-14839r290163_chk
Review the system documentation to obtain the definition of the database/DBMS functionality considered privileged in the context of the system in question. If any functionality considered privileged has access privileges granted to non-privileged users, this is a finding.
Fix: F-14837r290164_fix
Revoke any privileges to privileged functionality by executing the REVOKE command as documented here: http://www.postgresql.org/docs/current/static/sql-revoke.html
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002233
- Version
- PPS9-00-007500
- Vuln IDs
-
- V-213618
- V-68989
- Rule IDs
-
- SV-213618r508024_rule
- SV-83593
Checks: C-14840r290166_chk
Review the system documentation and source code of the application(s) using the database. If elevation of DBMS privileges is used but not documented, this is a finding. If elevation of DBMS privileges is documented but not implemented as described in the documentation, this is a finding. If the privilege-elevation logic can be invoked in ways other than intended, in contexts other than intended, or by subjects/principals other than intended, this is a finding. Execute the following SQL to find any SECURITY DEFINER functions (meaning they are executed as owner rather than invoker): select proname from pg_proc where prosecdef = true; If any of these functions should not be SECURITY DEFINER, this is a finding.
Fix: F-14838r290167_fix
Determine where, when, how, and by what principals/subjects elevated privilege is needed. Modify the system and the application(s) using the database to ensure privilege elevation is used only as required. To alter a function to use SECURITY INVOKER instead of SECURITY DEFINER, execute the following SQL: ALTER FUNCTION <function()> SECURITY INVOKER;
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002233
- Version
- PPS9-00-007510
- Vuln IDs
-
- V-213619
- V-68991
- Rule IDs
-
- SV-213619r508024_rule
- SV-83595
Checks: C-14841r290169_chk
Review the system documentation and source code of the application(s) using the database. If elevation of DBMS privileges is used but not documented, this is a finding. If elevation of DBMS privileges is documented but not implemented as described in the documentation, this is a finding. If the privilege-elevation logic can be invoked in ways other than intended, in contexts other than intended, or by subjects/principals other than intended, this is a finding. Execute the following SQL to find any users with BYPASS RLS permissions: select rolname from pg_roles where rolbypassrls = true; If any of these users are not superusers that should bypass RLS, this is a finding.
Fix: F-14839r290170_fix
Determine where, when, how, and by what principals/subjects elevated privilege is needed. Modify the system and the application(s) using the database to ensure privilege elevation is used only as required. To alter a user to not allow bypassing RLS, execute the following SQL: ALTER USER <user> NOBYPASSRLS;
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001844
- Version
- PPS9-00-007700
- Vuln IDs
-
- V-213620
- V-68993
- Rule IDs
-
- SV-213620r508024_rule
- SV-83597
Checks: C-14842r290172_chk
If a centralized log collecting tool such as Postgres Enterprise Manager (PEM) is not installed and configured to automatically collect audit logs, this is a finding. Review the system documentation for a description of how audit records are off-loaded and how local audit log space is managed.
Fix: F-14840r290173_fix
Install a centralized log collecting tool and configure it as instructed in its documentation. If using PEM, find the instructions at http://www.enterprisedb.com/docs/en/6.0/pemgetstarted/toc.html
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001844
- Version
- PPS9-00-007800
- Vuln IDs
-
- V-213621
- V-68995
- Rule IDs
-
- SV-213621r508024_rule
- SV-83599
Checks: C-14843r290175_chk
If a unified tool for audit configuration such as PEM (Postgres Enterprise Manager) is not installed and configured to automatically collect audit logs, this is a finding. Review the system documentation for a description of how audit records are off-loaded and how local audit log space is managed.
Fix: F-14841r290176_fix
Install a centralized log collecting tool and configure it as instructed in its documentation. If using PEM, find the instructions at http://www.enterprisedb.com/docs/en/6.0/pemgetstarted/toc.html
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- PPS9-00-007900
- Vuln IDs
-
- V-213622
- V-68997
- Rule IDs
-
- SV-213622r508024_rule
- SV-83601
Checks: C-14844r290178_chk
Investigate whether there have been any incidents where the DBMS ran out of audit log space since the last time the space was allocated or other corrective measures were taken. If there have been, this is a finding.
Fix: F-14842r290179_fix
Allocate sufficient audit file space to "<postgresql data directory>/edb_audit" to support peak demand.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- PPS9-00-008000
- Vuln IDs
-
- V-213623
- V-68999
- Rule IDs
-
- SV-213623r508024_rule
- SV-83603
Checks: C-14845r290181_chk
If Postgres Enterprise Manager (PEM) or another similar monitoring capability is not installed and configured to probe storage volume utilization of "<postgresql data directory>" and notify appropriate support staff upon storage volume utilization reaching 75 percent, this is a finding. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.)
Fix: F-14843r290182_fix
Install PEM and configure a probe to monitor "<postgresql data directory>" and notify appropriate support staff upon storage volume utilization reaching 75 percent. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) Example steps for creating a probe are below, using the thin client (browser) PEM interface. Refer also to the Supplemental Procedures document, supplied with this STIG. Open the PEM web console in a browser - Log in - Click on the agent for the machine to be monitored - Select "Management | Probe Configuration" - Select "Disk Space" and set the check interval as you like - Select "Management | Alerting" - Name the definition "Audit Log Full" - Select Template "Disk Consumption Percentage" - Set Frequency, Comparison Operator, and Thresholds (1 minute, >, 95/96/97 for example) - Enter the Mount Point for where the audit log is - Click Notification tab - Click Email all alerts - Click "Execute Script" on Monitored Server - Enter script to showdown postgres, generally "service ppas-95 stop" - Click Add/Change to save, click "OK" to exit dialog box
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- PPS9-00-008100
- Vuln IDs
-
- V-213624
- V-69001
- Rule IDs
-
- SV-213624r508024_rule
- SV-83605
Checks: C-14846r495386_chk
Review Postgres Enterprise Manager (PEM) alert settings, OS, or third-party logging software settings to determine whether a real-time alert will be sent to the appropriate personnel when auditing fails for any reason. If real-time alerts are not sent upon auditing failure, this is a finding.
Fix: F-14844r290185_fix
Install PEM and configure audit failure event alerting as documented here: http://www.enterprisedb.com/docs/en/5.0/pemgetstarted/PEM_Getting_Started_Guide.1.28.html An example for creating an alert that ensure the audit directory does not fill up is included below, using the thin client (browser) PEM interface. Refer also to the Supplemental Procedures document, supplied with this STIG. Open the PEM web console in a browser - Log in - Click on the agent for the machine to be monitored - Select "Management | Probe Configuration" - Select "Disk Space" and set the check interval as you like - Select "Management | Alerting" - Name the definition "Audit Log Full" - Select Template "Disk Consumption Percentage" - Set Frequency, Comparison Operator, and Thresholds (1 minute, >, 95/96/97 for example) - Enter the Mount Point for where the audit log is - Click Notification tab - Click Email all alerts - Click "Execute Script" on Monitored Server
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001812
- Version
- PPS9-00-008400
- Vuln IDs
-
- V-213625
- V-69003
- Rule IDs
-
- SV-213625r508024_rule
- SV-83607
Checks: C-14847r290187_chk
If EDB Postgres supports only software development, experimentation, and/or developer-level testing (that is, excluding production systems, integration testing, stress testing, and user acceptance testing), this is not a finding. Review the EDB Postgres security settings with respect to non-administrative users' ability to create, alter, or replace logic modules, to include but not necessarily only stored procedures, functions, triggers, and views. These psql commands can help with showing existing permissions of databases and schemas: \l \dn+ If any such permissions exist and are not documented and approved, this is a finding.
Fix: F-14845r290188_fix
Document and obtain approval for any non-administrative users who require the ability to create, alter, or replace logic modules. Implement the approved permissions. Revoke (or deny) any unapproved permissions and remove any unauthorized role memberships.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- PPS9-00-008500
- Vuln IDs
-
- V-213626
- V-69005
- Rule IDs
-
- SV-213626r508024_rule
- SV-83609
Checks: C-14848r290190_chk
Review the security configuration of the EDB Postgres database(s). If unauthorized users can start the SQL Server Configuration Manager or SQL Server Management Studio, this is a finding. If EDB Postgres does not enforce access restrictions associated with changes to the configuration of the database(s), this is a finding. - - - - - To assist in conducting reviews of permissions, the following psql commands describe permissions of databases, schemas, and users: \l \dn+ \du Permissions of concern in this respect include the following, and possibly others: - any user with SUPERUSER privileges - any database or schema with "C" (create) or "w" (update) privileges that are not necessary
Fix: F-14846r290191_fix
Configure EDB PPAS to enforce access restrictions associated with changes to the configuration of the EDB Postgres database(s).
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001814
- Version
- PPS9-00-008600
- Vuln IDs
-
- V-213627
- V-69007
- Rule IDs
-
- SV-213627r508024_rule
- SV-83611
Checks: C-14849r290193_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14847r290194_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- PPS9-00-008700
- Vuln IDs
-
- V-213628
- V-69009
- Rule IDs
-
- SV-213628r508024_rule
- SV-83613
Checks: C-14850r290196_chk
Review the network functions, ports, protocols, and services supported by the DBMS. If any protocol is prohibited by the PPSM guidance and is enabled, this is a finding. Open "<postgresql data directory>/pg_hba.conf" in a viewer. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) If any rows have a TYPE that is "host" or "hostnossl", this is a finding. Execute the following SQL as enterprisedb: SHOW port; If the displayed port is not allowed, this is a finding.
Fix: F-14848r290197_fix
Disable each prohibited network function, port, protocol, or service prohibited by the PPSM guidance. Open "<postgresql data directory>/pg_hba.conf" in an editor. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) Change the TYPE of any rows not starting with a "#" to be either "local" or "hostssl". The METHOD for the local rows should be "peer", which will authenticate based on the operating system name. The METHOD for the hostssl rows should be one of these (in preferred order): cert, ldap, sspi, pam, md5 Execute the following SQL as enterprisedb: ALTER SYSTEM SET port = <port>; Execute the following operating system command as root: systemctl restart ppas-9.5.service
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- PPS9-00-008800
- Vuln IDs
-
- V-213629
- V-69011
- Rule IDs
-
- SV-213629r508024_rule
- SV-83615
Checks: C-14851r290199_chk
If organization-defined circumstances or situations require re-authentication, and these situations are not configured to terminate existing logins to require re-authentication, this is a finding.
Fix: F-14849r290200_fix
Determine the organization-defined circumstances or situations that require re-authentication and ensure that the following SQL is executed in those situations. To require a single user to re-authenticate, use this SQL: "select pg_terminate_backend(pid) from pg_stat_activity where user='<username>';" To require all users to re-authenticate, use this SQL: "select pg_terminate_backend(pid) from pg_stat_activity where user like '%';".
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- PPS9-00-009100
- Vuln IDs
-
- V-213630
- V-69013
- Rule IDs
-
- SV-213630r508024_rule
- SV-83617
Checks: C-14852r290202_chk
Verify that the root.crt certificate was issued by a valid DoD entity. > openssl x509 -in <postgresql data directory>/root.crt –text | grep –i “issuer”. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) If any issuers are listed that are not valid DoD certificate authorities, this is a finding.
Fix: F-14850r290203_fix
Remove any certificate that was not issued by a valid DoD certificate authority. Contact the organization's certificate issuer and request a new certificate that is issued by a valid DoD certificate authorities.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002475
- Version
- PPS9-00-009200
- Vuln IDs
-
- V-213631
- V-69015
- Rule IDs
-
- SV-213631r508024_rule
- SV-83619
Checks: C-14853r290205_chk
Review the system documentation to determine whether the organization has defined the information at rest that is to be protected from modification, which must include, at a minimum, PII and classified information. If no information is identified as requiring such protection, this is not a finding. Review the configuration of the DBMS, operating system/file system, and additional software as relevant. If any of the information defined as requiring cryptographic protection from modification is not encrypted in a manner that provides the required level of protection, this is a finding.
Fix: F-14851r290206_fix
Create an encrypted partition to host the "<postgresql data directory>" directory. This can be done at the OS level with a technology such as db-crypt or other encryption technologies provided by third-party tools. If only certain columns require encryption, use pgcrypt to encrypt those columns as documented here: http://www.postgresql.org/docs/current/static/pgcrypto.html
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- PPS9-00-009300
- Vuln IDs
-
- V-213632
- V-69017
- Rule IDs
-
- SV-213632r508024_rule
- SV-83621
Checks: C-14854r290208_chk
Review the system documentation to determine whether the organization has defined the information at rest that is to be protected from modification, which must include, at a minimum, PII and classified information. If no information is identified as requiring such protection, this is not a finding. Review the configuration of the DBMS, operating system/file system, and additional software as relevant. If any of the information defined as requiring cryptographic protection from modification is not encrypted in a manner that provides the required level of protection, this is a finding.
Fix: F-14852r290209_fix
Create an encrypted partition to host the "<postgresql data directory>" directory. This can be done at the OS level with a technology such as db-crypt or other encryption technologies provided by third-party tools. If only certain columns need encryption, use pgcrypt to encrypt those columns as documented here: http://www.postgresql.org/docs/current/static/pgcrypto.html
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002420
- Version
- PPS9-00-009500
- Vuln IDs
-
- V-213633
- V-69019
- Rule IDs
-
- SV-213633r557394_rule
- SV-83623
Checks: C-14855r557392_chk
If the data owner does not have a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process, this is not a finding. Open "<postgresql data directory>/pg_hba.conf" in a viewer or editor. (The default path for the postgresql data directory is /var/lib/ppas/9.5/data, but this will vary according to local circumstances.) If any rows do not have TYPE of "hostssl" as well as a METHOD of "cert", this is a finding.
Fix: F-14853r557393_fix
To configure EDB Postgres Advanced Server to use SSL, open the ”postgresql.conf" file in an editor. Note that the default location for the postgresql.conf file is in the postgresql data directory. The location of the postgresql.conf for a running EDB Postgres instance can be found using the following command run from a command prompt: psql -d <database name> -U <database superuser name> -c “SHOW config_file” Where, <database name> is any database in the EDB postgres instance and <database superuser name> is a database superuser. By default, a database named "edb" and a superuser named "enterprisedb" are installed with EDB Postgres Advanced Server (EPAS). In the postgresql.conf file, set the “ssl” parameter as follows: ssl = on Make sure the parameter is uncommented. In order to start an EDB Postgres Advanced Server instance in SSL mode, files containing the server certificate and private key must exist. By default, these files are expected to exist in the Postgres data directory and are expected to be named server.crt and server.key, respectively. Update the ssl_cert_file and ssl_cert_key parameters in the postgresql.conf file if the files are placed in a different location or are named differently. Note that changes to the SSL parameter setting and any of the other SSL-related parameters require a database server restart to be put the changes into effect. To restart the database on a systemd server, issue the following command as the root user or a user with sudo access: systemctl restart edb-as-<EPAS version> Where, “<EPAS version>” is the major version of the EDB Postgres Advanced Server instance (e.g., 9.6). To restart the database on an initd server, issue the following command as the root user or a user with sudo access: service edb-as-<EDB Postgres version> restart Where, “<EPAS version>” is the major version of the EDB Postgres Advanced Server instance (e.g., 9.6). After verifying SSL is enabled for the database, open the pg_hba.conf file in an editor to configure the host-based authentication settings. Note the default location for the pg_hba.conf file is in the postgresql data directory. The location of the pg_hba.conf file for a running EDB postgres instance can be found using the following command run from a command prompt: psql -d <database name> -U <database superuser name> -c "SHOW hba_file" Where, <database name> is any database in the EDB postgres instance and <database superuser name> is a database superuser. By default, a database named "edb" and a superuser named "enterprisedb" are installed with EDB Postgres Advanced Server (EPAS). Obtain approval and document any uncommented entries with corresponding justification that are not of type hostssl and do not include the “clientcert=1” option. For any entries that are not of type hostssl authentication with the “clientcert=1” option and not documented and approved, change the "TYPE" column to “hostssl” and add the “clientcert=1” authentication method option. Note that changes to the host-based authentication settings require a database reload in order to apply the updated settings. To reload the database on a systemd server, issue the following command as the root user or a user with sudo access: systemctl reload edb-as-<EPAS version> Where, “<EPAS version>” is the major version of the EDB Postgres Advanced Server instance (e.g., 9.6). To reload the database on an initd server, issue the following command as the root user or a user with sudo access: service edb-as-<EDB Postgres version> reload Where, “<EPAS version>” is the major version of the EDB Postgres Advanced Server instance (e.g., 9.6). For more information on configuring PostgreSQL to use SSL, consult the following documentation: https://www.postgresql.org/docs/current/ssl-tcp.html
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002422
- Version
- PPS9-00-009600
- Vuln IDs
-
- V-213634
- V-69021
- Rule IDs
-
- SV-213634r557397_rule
- SV-83625
Checks: C-14856r557395_chk
If the data owner does not have a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process, this is not a finding. First, check if SSL is enabled for the database instance by executing the following command from a command prompt: psql -d <database name> -U <database superuser name> -c "SHOW ssl” Where, <database name> is any database in the EDB postgres instance and <database superuser name> is a database superuser. By default, a database named "edb" and a superuser named "enterprisedb" are installed with EDB Postgres Advanced Server (EPAS). If the result is not "on", this is a finding. Next, open the pg_hba.conf file in a viewer or editor and review the authentication settings that are configured in that file. Note the default location for the pg_hba.conf file is in the postgresql data directory. The location of the pg_hba.conf file for a running EDB postgres instance can be found using the following command run from a command prompt: psql -d <database name> -U <database superuser name> -c "SHOW hba_file" Where, <database name> is any database in the EDB postgres instance and <database superuser name> is a database superuser. By default, a database named "edb" and a superuser named "enterprisedb" are installed with EDB Postgres Advanced Server (EPAS). If any uncommented lines are not of TYPE "hostssl" and do not include the "clientcert=1" authentication option and are not documented in the system security plan or equivalent document as being approved, this is a finding.
Fix: F-14854r557396_fix
To configure EDB Postgres Advanced Server to use SSL, open the ”postgresql.conf" file in an editor. Note the default location for the postgresql.conf file is in the postgresql data directory. The location of the postgresql.conf for a running EDB Postgres instance can be found using the following command run from a command prompt: psql -d <database name> -U <database superuser name> -c “SHOW config_file” Where, <database name> is any database in the EDB postgres instance and <database superuser name> is a database superuser. By default, a database named "edb" and a superuser named "enterprisedb" are installed with EDB Postgres Advanced Server (EPAS). In the postgresql.conf file, set the “ssl” parameter as follows: ssl = on Make sure the parameter is uncommented. In order to start an EDB Postgres Advanced Server instance in SSL mode, files containing the server certificate and private key must exist. By default, these files are expected to exist in the Postgres data directory and are expected to be named server.crt and server.key, respectively. Update the ssl_cert_file and ssl_cert_key parameters in the postgresql.conf file if the files are placed in a different location or are named differently. Note that changes to the SSL parameter setting and any of the other SSL- related parameters require a database server restart to be put the changes into effect. To restart the database on a systemd server, issue the following command as the root user or a user with sudo access: systemctl restart edb-as-<EPAS version> Where, “<EPAS version>” is the major version of the EDB Postgres Advanced Server instance (e.g., 9.6). To restart the database on an initd server, issue the following command as the root user or a user with sudo access: service edb-as-<EDB Postgres version> restart Where, “<EPAS version>” is the major version of the EDB Postgres Advanced Server instance (e.g., 9.6). After verifying that SSL is enabled for the database, open the pg_hba.conf file in an editor to configure the host-based authentication settings. Note that the default location for the pg_hba.conf file is in the postgresql data directory. The location of the pg_hba.conf file for a running EDB postgres instance can be found using the following command run from a command prompt: psql -d <database name> -U <database superuser name> -c "SHOW hba_file" Where, <database name> is any database in the EDB postgres instance and <database superuser name> is a database superuser. By default, a database named "edb" and a superuser named "enterprisedb" are installed with EDB Postgres Advanced Server (EPAS). Obtain approval and document any uncommented entries with corresponding justification that are not of type hostssl and do not include the “clientcert=1” option. For any entries that are not of type hostssl authentication with the “clientcert=1” option and not documented and approved, change the "TYPE" column to “hostssl” and add the “clientcert=1” authentication method option. Note that changes to the host-based authentication settings require a database reload in order to apply the updated settings.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-002754
- Version
- PPS9-00-009700
- Vuln IDs
-
- V-213635
- V-69023
- Rule IDs
-
- SV-213635r508024_rule
- SV-83627
Checks: C-14857r290217_chk
Execute the following SQL as enterprisedb: SELECT * FROM sqlprotect.list_protected_users; If the database and user that handles user input is not listed or if sqlprotect.list_protected_users does not exist (meaning SQL/Protect is not installed), and an alternative means of reviewing for vulnerable code is not in use, this is a finding.
Fix: F-14855r290218_fix
Install and configure SQL/Protect as documented here: http://www.enterprisedb.com/docs/en/9.5/eeguide/Postgres_Plus_Enterprise_Edition_Guide.1.072.html# Alternatively, implement, document, and maintain another method of checking for the validity of inputs.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- PPS9-00-009900
- Vuln IDs
-
- V-213636
- V-69025
- Rule IDs
-
- SV-213636r508024_rule
- SV-83629
Checks: C-14858r290220_chk
Obtain evidence that software patches are obtained from EnterpriseDB and are consistently applied to the DBMS within the timeframe defined for each patch. If such evidence cannot be obtained, or the evidence that is obtained indicates a pattern of noncompliance, this is a finding. If an administrator is not registered on the EDB Support Portal with an email address for monitoring technical alerts, this is a finding.
Fix: F-14856r290221_fix
Institute and adhere to policies and procedures to ensure that patches are consistently obtained from EnterpriseDB and applied to the DBMS within the time allowed. Ensure that a monitored email address is registered as a user on the EDB support portal and is receiving technical alerts.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-010000
- Vuln IDs
-
- V-213637
- V-69027
- Rule IDs
-
- SV-213637r508024_rule
- SV-83631
Checks: C-14859r290223_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14857r290224_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-010100
- Vuln IDs
-
- V-213638
- V-69029
- Rule IDs
-
- SV-213638r508024_rule
- SV-83633
Checks: C-14860r290226_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14858r290227_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-010200
- Vuln IDs
-
- V-213639
- V-69031
- Rule IDs
-
- SV-213639r508024_rule
- SV-83635
Checks: C-14861r290229_chk
Review the system documentation to determine whether it is required to track categorized information, such as classification or sensitivity level. If it is not, this is not applicable (NA). Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14859r290230_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-010300
- Vuln IDs
-
- V-213640
- V-69033
- Rule IDs
-
- SV-213640r508024_rule
- SV-83637
Checks: C-14862r290232_chk
Review the system documentation to determine whether it is required to track categorized information, such as classification or sensitivity level. If it is not, this is not applicable (NA). Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14860r290233_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-010400
- Vuln IDs
-
- V-213641
- V-69035
- Rule IDs
-
- SV-213641r508024_rule
- SV-83639
Checks: C-14863r290235_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14861r290236_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-010500
- Vuln IDs
-
- V-213642
- V-69037
- Rule IDs
-
- SV-213642r508024_rule
- SV-83641
Checks: C-14864r290238_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14862r290239_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-010800
- Vuln IDs
-
- V-213643
- V-69039
- Rule IDs
-
- SV-213643r508024_rule
- SV-83643
Checks: C-14865r290241_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14863r290242_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-010900
- Vuln IDs
-
- V-213644
- V-69041
- Rule IDs
-
- SV-213644r508024_rule
- SV-83645
Checks: C-14866r290244_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14864r290245_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-011000
- Vuln IDs
-
- V-213645
- V-69043
- Rule IDs
-
- SV-213645r508024_rule
- SV-83647
Checks: C-14867r290247_chk
Review the system documentation to determine whether it is required to track categorized information, such as classification or sensitivity level. If it is not, this is not applicable (NA). Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14865r290248_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-011050
- Vuln IDs
-
- V-213646
- V-69087
- Rule IDs
-
- SV-213646r508024_rule
- SV-83691
Checks: C-14868r290250_chk
Review the system documentation to determine whether it is required to track categorized information, such as classification or sensitivity level. If it is not, this is not applicable (NA). Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14866r290251_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-011100
- Vuln IDs
-
- V-213647
- V-69045
- Rule IDs
-
- SV-213647r508024_rule
- SV-83649
Checks: C-14869r290253_chk
Review the system documentation to determine whether it is required to track categorized information, such as classification or sensitivity level. If it is not, this is not applicable (NA). Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14867r290254_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-011150
- Vuln IDs
-
- V-213648
- V-69089
- Rule IDs
-
- SV-213648r508024_rule
- SV-83693
Checks: C-14870r290256_chk
Review the system documentation to determine whether it is required to track categorized information, such as classification or sensitivity level. If it is not, this is not applicable (NA). Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14868r290257_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-011200
- Vuln IDs
-
- V-213649
- V-69047
- Rule IDs
-
- SV-213649r508024_rule
- SV-83651
Checks: C-14871r290259_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14869r290260_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-011300
- Vuln IDs
-
- V-213650
- V-69049
- Rule IDs
-
- SV-213650r508024_rule
- SV-83653
Checks: C-14872r290262_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14870r290263_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-011400
- Vuln IDs
-
- V-213651
- V-69051
- Rule IDs
-
- SV-213651r508024_rule
- SV-83655
Checks: C-14873r290265_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14871r290266_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-011500
- Vuln IDs
-
- V-213652
- V-69053
- Rule IDs
-
- SV-213652r508024_rule
- SV-83657
Checks: C-14874r290268_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14872r290269_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-011600
- Vuln IDs
-
- V-213653
- V-69055
- Rule IDs
-
- SV-213653r508024_rule
- SV-83659
Checks: C-14875r290271_chk
Review the system documentation to determine whether it is required to track categorized information, such as classification or sensitivity level. If it is not, this is not applicable (NA). Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14873r290272_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-011700
- Vuln IDs
-
- V-213654
- V-69057
- Rule IDs
-
- SV-213654r508024_rule
- SV-83661
Checks: C-14876r290274_chk
Review the system documentation to determine whether it is required to track categorized information, such as classification or sensitivity level. If it is not, this is not applicable (NA). Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14874r290275_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-011800
- Vuln IDs
-
- V-213655
- V-69059
- Rule IDs
-
- SV-213655r508024_rule
- SV-83663
Checks: C-14877r290277_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_connect; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14875r290278_fix
Execute the following SQL as enterprisedb: SHOW edb_audit_connect; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding. Fix Text: Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_connect = 'all'; ALTER SYSTEM SET edb_audit_disconnect = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-011900
- Vuln IDs
-
- V-213656
- V-69061
- Rule IDs
-
- SV-213656r508024_rule
- SV-83665
Checks: C-14878r290280_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_connect; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14876r290281_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_connect = 'all'; ALTER SYSTEM SET edb_audit_disconnect = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-012000
- Vuln IDs
-
- V-213657
- V-69063
- Rule IDs
-
- SV-213657r508024_rule
- SV-83667
Checks: C-14879r290283_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14877r290284_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-012100
- Vuln IDs
-
- V-213658
- V-69065
- Rule IDs
-
- SV-213658r508024_rule
- SV-83669
Checks: C-14880r290286_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14878r290287_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-012200
- Vuln IDs
-
- V-213659
- V-69067
- Rule IDs
-
- SV-213659r508024_rule
- SV-83671
Checks: C-14881r290289_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_connect; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14879r290290_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_connect = 'all'; ALTER SYSTEM SET edb_audit_disconnect = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-012300
- Vuln IDs
-
- V-213660
- V-69069
- Rule IDs
-
- SV-213660r508024_rule
- SV-83673
Checks: C-14882r290292_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_connect; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14880r290293_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_connect = 'all'; ALTER SYSTEM SET edb_audit_disconnect = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-012400
- Vuln IDs
-
- V-213661
- V-69071
- Rule IDs
-
- SV-213661r508024_rule
- SV-83675
Checks: C-14883r290295_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14881r290296_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-012500
- Vuln IDs
-
- V-213662
- V-69073
- Rule IDs
-
- SV-213662r508024_rule
- SV-83677
Checks: C-14884r290298_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14882r290299_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- PPS9-00-012600
- Vuln IDs
-
- V-213663
- V-69075
- Rule IDs
-
- SV-213663r508024_rule
- SV-83679
Checks: C-14885r290301_chk
Execute the following SQL as enterprisedb: SHOW edb_audit_statement; SHOW edb_audit_connect; SHOW edb_audit_disconnect; If the result is not "all" for any or if the current settings for this requirement have not been noted and approved by the organization in the system documentation, this is a finding.
Fix: F-14883r290302_fix
Execute the following SQL as enterprisedb: ALTER SYSTEM SET edb_audit_statement = 'all'; ALTER SYSTEM SET edb_audit_connect = 'all'; ALTER SYSTEM SET edb_audit_disconnect = 'all'; SELECT pg_reload_conf(); or Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- PPS9-00-012700
- Vuln IDs
-
- V-213664
- V-69077
- Rule IDs
-
- SV-213664r508024_rule
- SV-83681
Checks: C-14886r290304_chk
If a FIPS-certified OpenSSL library is not installed, this is a finding. Run this command "cat /proc/sys/crypto/fips_enabled". If the output is not "1", this is a finding.
Fix: F-14884r290305_fix
There is no known fix for a FIPS-compliant OpenSSL library on Microsoft Windows at this time. Configure RHEL OpenSSL as defined in section 9.1 of the RHEL OpenSSL FIPS Compliance documentation here: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1758.pdf
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- PPS9-00-012800
- Vuln IDs
-
- V-213665
- V-69079
- Rule IDs
-
- SV-213665r508024_rule
- SV-83683
Checks: C-14887r290307_chk
If a FIPS-certified OpenSSL library is not installed, this is a finding. Run the command "cat /proc/sys/crypto/fips_enabled". If the output is not "1", this is a finding.
Fix: F-14885r290308_fix
There is no known fix for a FIPS-compliant OpenSSL library on Microsoft Windows at this time. Configure RHEL OpenSSL as defined in section 9.1 of the RHEL OpenSSL FIPS Compliance documentation here: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1758.pdf
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- PPS9-00-012900
- Vuln IDs
-
- V-213666
- V-69081
- Rule IDs
-
- SV-213666r508024_rule
- SV-83685
Checks: C-14888r290310_chk
If a FIPS-certified OpenSSL library is not installed, this is a finding. Run the command "cat /proc/sys/crypto/fips_enabled". If the output is not "1", this is a finding.
Fix: F-14886r290311_fix
There is no known fix for a FIPS compliant OpenSSL library on Microsoft Windows at this time. Configure RHEL OpenSSL as defined in section 9.1 of the RHEL OpenSSL FIPS Compliance documentation here: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1758.pdf
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- PPS9-00-013000
- Vuln IDs
-
- V-213667
- V-69083
- Rule IDs
-
- SV-213667r508024_rule
- SV-83687
Checks: C-14889r290313_chk
If Postgres Enterprise Manager (PEM) or another log collection tool is not installed and configured to automatically collect audit logs, this is a finding. Review the system documentation for a description of how audit records are off-loaded and how local audit log space is managed.
Fix: F-14887r290314_fix
Install PEM and configure the centralized audit manager as documented here: http://www.enterprisedb.com/docs/en/5.0/pemgetstarted/PEM_Getting_Started_Guide.1.32.html# If another tool other than PEM is used, configure it to meet this requirement.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- PPS9-00-013200
- Vuln IDs
-
- V-213668
- V-69085
- Rule IDs
-
- SV-213668r508024_rule
- SV-83689
Checks: C-14890r290316_chk
If the Postgres Plus Advanced Server is not installed on Red Hat Enterprise Linux (RHEL), this is a finding.
Fix: F-14888r290317_fix
Install Postgres Plus Advanced Server on RHEL or ensure that FIPS 140-2 certified OpenSSL libraries are used by the DBMS.