VMW vRealize Automation 7.x PostgreSQL Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +69 −69
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 69
- V-240276 Medium vRA PostgreSQL database log file data must contain required data elements.
- V-240277 Medium The vRA PostgreSQL configuration file must not be accessible by unauthorized users.
- V-240278 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-240279 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-240280 Medium vRA PostgreSQL database log file data must contain required data elements.
- V-240281 Medium vRA PostgreSQL database log file data must contain required data elements.
- V-240282 Medium vRA PostgreSQL database log file data must contain required data elements.
- V-240283 Medium vRA PostgreSQL database log file data must contain required data elements.
- V-240284 Medium vRA PostgreSQL database log file data must contain required data elements.
- V-240285 Medium vRA PostgreSQL database log file data must contain required data elements.
- V-240286 Medium vRA PostgreSQL database log file data must contain required data elements.
- V-240287 Low vRA PostgreSQL database must have log_truncate_on_rotation enabled.
- V-240288 Medium The vRA PostgreSQL database must have the correct permissions on the log files.
- V-240289 Medium The vRA PostgreSQL database must have the correct ownership on the log files.
- V-240290 Medium The vRA PostgreSQL database must have the correct group-ownership on the log files.
- V-240291 Medium The vRA PostgreSQL configuration files must have the correct permissions.
- V-240292 Medium The vRA PostgreSQL configuration files must have the correct ownership.
- V-240293 Medium The vRA PostgreSQL configuration files must have the correct group-ownership.
- V-240294 Medium vRA PostgreSQL database objects must only be accessible to the postgres account.
- V-240295 Medium The vRA PostgreSQL database must limit modify privileges to authorized accounts.
- V-240296 Medium The vRA PostgreSQL database must not contain sample data.
- V-240297 Medium The vRA PostgreSQL database must be limited to authorized accounts.
- V-240298 Medium The vRA PostgreSQL database must use md5 for authentication.
- V-240299 Medium The vRA PostgreSQL database must be configured to use ssl.
- V-240300 Medium The vRA PostgreSQL database must complete writing log entries prior to returning results.
- V-240301 Medium The vRA PostgreSQL must not allow access to unauthorized accounts.
- V-240302 Medium Data from the vRA PostgreSQL database must be protected from unauthorized transfer.
- V-240303 Medium The vRA PostgreSQL error file must be protected from unauthorized access.
- V-240304 Medium The vRA PostgreSQL database must have log collection enabled.
- V-240305 Medium The vRA PostgreSQL database must be configured to use a syslog facility.
- V-240306 Medium The vRA PostgreSQL database must be configured to use a syslog facility.
- V-240307 Medium The vRA PostgreSQL database must use UTC for log timestamps.
- V-240308 Medium vRA PostgreSQL database log file data must contain required data elements.
- V-240309 Medium The DBMS must enforce access restrictions associated with changes to the configuration of the DBMS or database(s).
- V-240310 Medium vRA PostgreSQL database must be configured to validate character encoding to UTF-8.
- V-240311 High The vRA PostgreSQL database security updates and patches must be installed in a timely manner in accordance with site policy.
- V-240312 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-240313 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-240314 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-240315 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-240316 Medium The DBMS must generate audit records when privileges/permissions are modified.
- V-240317 Medium The DBMS must generate audit records when unsuccessful attempts to modify privileges/permissions occur.
- V-240318 Medium The DBMS must generate audit records when security objects are modified.
- V-240319 Medium The DBMS must generate audit records when unsuccessful attempts to modify security objects occur.
- V-240320 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-240321 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-240322 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-240323 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-240324 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-240325 Medium The vRA PostgreSQL database must set log_connections to on.
- V-240326 Medium The vRA PostgreSQL database must set the log_min_messages to warning.
- V-240327 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-240328 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-240329 Medium The vRA PostgreSQL database must set log_connections to on.
- V-240330 Medium The vRA PostgreSQL database must set log_connections to on.
- V-240331 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-240332 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-240333 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-240334 High The vRA PostgreSQL database must use FIPS 140-2 ciphers.
- V-240335 High The vRA PostgreSQL database must use FIPS 140-2 ciphers.
- V-240336 High The vRA PostgreSQL database must use FIPS 140-2 ciphers.
- V-240337 Medium The vRA PostgreSQL database must be configured to use a syslog facility.
- V-240338 Medium vRA PostgreSQL must have the latest approved security-relevant software updates installed.
- V-240339 High The DBMS must use NIST FIPS 140-2 validated cryptographic modules for cryptographic operations.
- V-240340 Medium vRA Postgres must be configured to use the correct port.
- V-240341 Medium The vRA PostgreSQL database must have log collection enabled.
- V-240342 Medium vRA Postgres must be configured to use the correct port.
- V-240343 Medium vRA PostgreSQL must limit the number of connections.
- V-258453 High The version of vRealize Automation 7.x PostgreSQL running on the system must be a supported version.
Removed rules 69
- V-89327 Medium vRA PostgreSQL database log file data must contain required data elements.
- V-89329 Medium The vRA PostgreSQL configuration file must not be accessible by unauthorized users.
- V-89331 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-89333 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-89335 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-89337 Medium vRA PostgreSQL database log file data must contain required data elements.
- V-89339 Medium vRA PostgreSQL database log file data must contain required data elements.
- V-89341 Medium vRA PostgreSQL database log file data must contain required data elements.
- V-89343 Medium vRA PostgreSQL database log file data must contain required data elements.
- V-89345 Medium vRA PostgreSQL database log file data must contain required data elements.
- V-89347 Medium vRA PostgreSQL database log file data must contain required data elements.
- V-89349 Medium vRA PostgreSQL database log file data must contain required data elements.
- V-89351 Low vRA PostgreSQL database must have log_truncate_on_rotation enabled.
- V-89353 Medium The vRA PostgreSQL database must have the correct permissions on the log files.
- V-89355 Medium The vRA PostgreSQL database must have the correct ownership on the log files.
- V-89357 Medium The vRA PostgreSQL database must have the correct group-ownership on the log files.
- V-89359 Medium The vRA PostgreSQL configuration files must have the correct permissions.
- V-89361 Medium The vRA PostgreSQL configuration files must have the correct ownership.
- V-89363 Medium The vRA PostgreSQL configuration files must have the correct group-ownership.
- V-89365 Medium vRA PostgreSQL database objects must only be accessible to the postgres account.
- V-89367 Medium The vRA PostgreSQL database must limit modify privileges to authorized accounts.
- V-89369 Medium The vRA PostgreSQL database must not contain sample data.
- V-89371 Medium The vRA PostgreSQL database must be limited to authorized accounts.
- V-89373 Medium The vRA PostgreSQL database must use md5 for authentication.
- V-89375 Medium The vRA PostgreSQL database must be configured to use ssl.
- V-89377 Medium The vRA PostgreSQL database must complete writing log entries prior to returning results.
- V-89379 Medium The vRA PostgreSQL must not allow access to unauthorized accounts.
- V-89381 Medium Data from the vRA PostgreSQL database must be protected from unauthorized transfer.
- V-89383 Medium The vRA PostgreSQL error file must be protected from unauthorized access.
- V-89385 Medium The vRA PostgreSQL database must have log collection enabled.
- V-89387 Medium The vRA PostgreSQL database must be configured to use a syslog facility.
- V-89389 Medium The vRA PostgreSQL database must be configured to use a syslog facility.
- V-89391 Medium The vRA PostgreSQL database must use UTC for log timestamps.
- V-89393 Medium vRA PostgreSQL database log file data must contain required data elements.
- V-89395 Medium The DBMS must enforce access restrictions associated with changes to the configuration of the DBMS or database(s).
- V-89397 Medium vRA PostgreSQL database must be configured to validate character encoding to UTF-8.
- V-89399 High The vRA PostgreSQL database security updates and patches must be installed in a timely manner in accordance with site policy.
- V-89401 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-89403 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-89405 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-89407 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-89409 Medium The DBMS must generate audit records when privileges/permissions are modified.
- V-89411 Medium The DBMS must generate audit records when unsuccessful attempts to modify privileges/permissions occur.
- V-89413 Medium The DBMS must generate audit records when security objects are modified.
- V-89415 Medium The DBMS must generate audit records when unsuccessful attempts to modify security objects occur.
- V-89417 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-89419 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-89421 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-89423 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-89425 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-89427 Medium The vRA PostgreSQL database must set log_connections to on.
- V-89429 Medium The vRA PostgreSQL database must set the log_min_messages to warning.
- V-89431 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-89433 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-89435 Medium The vRA PostgreSQL database must set log_connections to on.
- V-89437 Medium The vRA PostgreSQL database must set log_connections to on.
- V-89439 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-89441 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-89443 Medium The vRA PostgreSQL database must set the log_statement to all.
- V-89445 High The vRA PostgreSQL database must use FIPS 140-2 ciphers.
- V-89447 High The vRA PostgreSQL database must use FIPS 140-2 ciphers.
- V-89449 High The vRA PostgreSQL database must use FIPS 140-2 ciphers.
- V-89451 Medium The vRA PostgreSQL database must be configured to use a syslog facility.
- V-89453 Medium vRA PostgreSQL must have the latest approved security-relevant software updates installed.
- V-89455 High The DBMS must use NIST FIPS 140-2 validated cryptographic modules for cryptographic operations.
- V-89457 Medium vRA Postgres must be configured to use the correct port.
- V-89459 Medium The vRA PostgreSQL database must have log collection enabled.
- V-89461 Medium vRA Postgres must be configured to use the correct port.
- V-89463 Medium vRA PostgreSQL must limit the number of connections.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- VRAU-PG-000020
- Vuln IDs
-
- V-240276
- V-89327
- Rule IDs
-
- SV-240276r879559_rule
- SV-99977
Checks: C-43509r668670_chk
At the command prompt, execute the following command: # grep '^\s*log_line_prefix\b' /storage/db/pgdata/postgresql.conf If "log_line_prefix" is not set to "%m %d %u %r %p %l %c", this is a finding.
Fix: F-43468r668671_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_line_prefix TO '%m %d %u %r %p %l %c';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000171
- Version
- VRAU-PG-000025
- Vuln IDs
-
- V-240277
- V-89329
- Rule IDs
-
- SV-240277r879560_rule
- SV-99979
Checks: C-43510r668673_chk
At the command prompt, enter the following command: # ls -l /storage/db/pgdata/*conf* If the permissions on any of the listed files are not "600", this is a finding.
Fix: F-43469r668674_fix
At the command prompt, enter the following command: # chmod 600 <file> Note: Replace <file> with the file with incorrect permissions.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VRAU-PG-000030
- Vuln IDs
-
- V-240278
- V-89331
- Rule IDs
-
- SV-240278r879561_rule
- SV-99981
Checks: C-43511r668676_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/pgdata/postgresql.conf If "log_statement" is not "all", this is a finding.
Fix: F-43470r668677_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- VRAU-PG-000040
- Vuln IDs
-
- V-240279
- V-89333
- Rule IDs
-
- SV-240279r879562_rule
- SV-99983
Checks: C-43512r668679_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/pgdata/postgresql.conf If "log_statement" is not "all", this is a finding.
Fix: F-43471r668680_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- VRAU-PG-000050
- Vuln IDs
-
- V-240280
- V-89337
- Rule IDs
-
- SV-240280r879563_rule
- SV-99987
Checks: C-43513r668682_chk
At the command prompt, execute the following command: # grep '^\s*log_line_prefix\b' /storage/db/pgdata/postgresql.conf If "log_line_prefix" is not set to "%m %d %u %r %p %l %c", this is a finding.
Fix: F-43472r668683_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_line_prefix TO '%m %d %u %r %p %l %c';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- VRAU-PG-000055
- Vuln IDs
-
- V-240281
- V-89339
- Rule IDs
-
- SV-240281r879564_rule
- SV-99989
Checks: C-43514r668685_chk
At the command prompt, execute the following command: # grep '^\s*log_line_prefix\b' /storage/db/pgdata/postgresql.conf If "log_line_prefix" is not set to "%m %d %u %r %p %l %c", this is a finding.
Fix: F-43473r668686_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_line_prefix TO '%m %d %u %r %p %l %c';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- VRAU-PG-000060
- Vuln IDs
-
- V-240282
- V-89341
- Rule IDs
-
- SV-240282r879565_rule
- SV-99991
Checks: C-43515r668688_chk
At the command prompt, execute the following command: # grep '^\s*log_line_prefix\b' /storage/db/pgdata/postgresql.conf If "log_line_prefix" is not set to "%m %d %u %r %p %l %c", this is a finding.
Fix: F-43474r668689_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_line_prefix TO '%m %d %u %r %p %l %c';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- VRAU-PG-000065
- Vuln IDs
-
- V-240283
- V-89343
- Rule IDs
-
- SV-240283r879566_rule
- SV-99993
Checks: C-43516r668691_chk
At the command prompt, execute the following command: # grep '^\s*log_line_prefix\b' /storage/db/pgdata/postgresql.conf If "log_line_prefix" is not set to "%m %d %u %r %p %l %c", this is a finding.
Fix: F-43475r668692_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_line_prefix TO '%m %d %u %r %p %l %c';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- VRAU-PG-000070
- Vuln IDs
-
- V-240284
- V-89345
- Rule IDs
-
- SV-240284r879567_rule
- SV-99995
Checks: C-43517r668694_chk
At the command prompt, execute the following command: # grep '^\s*log_line_prefix\b' /storage/db/pgdata/postgresql.conf If "log_line_prefix" is not set to "%m %d %u %r %p %l %c", this is a finding.
Fix: F-43476r668695_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_line_prefix TO '%m %d %u %r %p %l %c';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- VRAU-PG-000075
- Vuln IDs
-
- V-240285
- V-89347
- Rule IDs
-
- SV-240285r879568_rule
- SV-99997
Checks: C-43518r668697_chk
At the command prompt, execute the following command: # grep '^\s*log_line_prefix\b' /storage/db/pgdata/postgresql.conf If "log_line_prefix" is not set to "%m %d %u %r %p %l %c", this is a finding.
Fix: F-43477r668698_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_line_prefix TO '%m %d %u %r %p %l %c';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- VRAU-PG-000080
- Vuln IDs
-
- V-240286
- V-89349
- Rule IDs
-
- SV-240286r879569_rule
- SV-99999
Checks: C-43519r668700_chk
At the command prompt, execute the following command: # grep '^\s*log_line_prefix\b' /storage/db/pgdata/postgresql.conf If "log_line_prefix" is not set to "%m %d %u %r %p %l %c", this is a finding.
Fix: F-43478r668701_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_line_prefix TO '%m %d %u %r %p %l %c';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-5
- Severity
- L
- CCI
- CCI-000140
- Version
- VRAU-PG-000085
- Vuln IDs
-
- V-240287
- V-89351
- Rule IDs
-
- SV-240287r879571_rule
- SV-100001
Checks: C-43520r668703_chk
At the command prompt, execute the following command: # grep '^\s*log_truncate_on_rotation\b' /storage/db/pgdata/postgresql.conf If "log_truncate_on_rotation" is not set to "on", this is a finding.
Fix: F-43479r668704_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_truncate_on_rotation TO 'on';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- VRAU-PG-000095
- Vuln IDs
-
- V-240288
- V-89353
- Rule IDs
-
- SV-240288r879576_rule
- SV-100003
Checks: C-43521r668706_chk
At the command prompt, enter the following command: # ls -l /storage/db/pgdata/pg_log/*.log If the permissions on any log files are not "600", this is a finding.
Fix: F-43480r668707_fix
At the command prompt, enter the following command: # chmod 600 /storage/db/pgdata/pg_log/<file_name> Replace <file_name> with files to be modified. At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_file_mode TO '0600';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- VRAU-PG-000100
- Vuln IDs
-
- V-240289
- V-89355
- Rule IDs
-
- SV-240289r879577_rule
- SV-100005
Checks: C-43522r668709_chk
At the command prompt, enter the following command: # ls -l /storage/db/pgdata/pg_log/*.log If the owner of any log files are not "postgres:users", this is a finding.
Fix: F-43481r668710_fix
At the command prompt, enter the following command: # chown postgres:users /storage/db/pgdata/pg_log/<file_name> Replace <file_name> with files to be modified.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- VRAU-PG-000105
- Vuln IDs
-
- V-240290
- V-89357
- Rule IDs
-
- SV-240290r879578_rule
- SV-100007
Checks: C-43523r668712_chk
At the command prompt, enter the following command: # ls -l /storage/db/pgdata/pg_log/*.log If the group-owner of any log files are not "postgres:users", this is a finding.
Fix: F-43482r668713_fix
At the command prompt, enter the following command: # chown postgres:users /storage/db/pgdata/pg_log/<file_name> Replace <file_name> with files to be modified.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- VRAU-PG-000110
- Vuln IDs
-
- V-240291
- V-89359
- Rule IDs
-
- SV-240291r879579_rule
- SV-100009
Checks: C-43524r668715_chk
At the command prompt, enter the following command: # ls -l /storage/db/pgdata/*conf* If the permissions on any of the listed files are not "600", this is a finding.
Fix: F-43483r668716_fix
At the command prompt, enter the following command: # chmod 600 <file> Note: Replace <file> with the file with incorrect permissions.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- VRAU-PG-000115
- Vuln IDs
-
- V-240292
- V-89361
- Rule IDs
-
- SV-240292r879580_rule
- SV-100011
Checks: C-43525r668718_chk
At the command prompt, enter the following command: # ls -l /storage/db/pgdata/*conf* If the owner of any configuration file is not "postgres:users", this is a finding.
Fix: F-43484r668719_fix
At the command prompt, enter the following command: # chown postgres:users <file_name> Replace <file_name> with files to be modified.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001495
- Version
- VRAU-PG-000120
- Vuln IDs
-
- V-240293
- V-89363
- Rule IDs
-
- SV-240293r879581_rule
- SV-100013
Checks: C-43526r668721_chk
At the command prompt, enter the following command: # ls -l /storage/db/pgdata/*conf* If the group-owner of any configuration file is not "postgres:users", this is a finding.
Fix: F-43485r668722_fix
At the command prompt, enter the following command: # chown postgres:users <file_name> Replace <file_name> with files to be modified.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- VRAU-PG-000135
- Vuln IDs
-
- V-240294
- V-89365
- Rule IDs
-
- SV-240294r879586_rule
- SV-100015
Checks: C-43527r668724_chk
At the command prompt, execute the following command: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "\dp;" Review the Access Privileges column. If any tables have permissions to users other than "postgres", this is a finding.
Fix: F-43486r668725_fix
At the command prompt, execute the following command: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER TABLE <tablename> OWNER TO postgres;" Replace <tablename> with the name of the table discovered during the check.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- VRAU-PG-000140
- Vuln IDs
-
- V-240295
- V-89367
- Rule IDs
-
- SV-240295r668729_rule
- SV-100017
Checks: C-43528r668727_chk
At the command prompt, execute the following command: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "\du;" If the accounts other than "postgres" and "vcac_replication" have "create" privileges, this is a finding.
Fix: F-43487r668728_fix
At the command prompt, execute the following command: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "REVOKE ALL PRIVILEGES FROM <user>;" Replace <user> with the account discovered during the check.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VRAU-PG-000145
- Vuln IDs
-
- V-240296
- V-89369
- Rule IDs
-
- SV-240296r879587_rule
- SV-100019
Checks: C-43529r668874_chk
At the command prompt, execute the following command: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT datname FROM pg_database WHERE datistemplate = false;" If the output is not the following lines, this is a finding. datname ---------- postgres vcac (2 rows)
Fix: F-43488r668731_fix
At the command prompt, execute the following command: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "DROP DATABASE IF EXISTS <name>;"
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- VRAU-PG-000160
- Vuln IDs
-
- V-240297
- V-89371
- Rule IDs
-
- SV-240297r879589_rule
- SV-100021
Checks: C-43530r668733_chk
At the command prompt, execute the following command to enter the psql prompt: # cat /storage/db/pgdata/pg_hba.conf If any rows have "trust" specified for the "METHOD" column, this is a finding.
Fix: F-43489r668734_fix
Navigate to and open /storage/db/pgdata/pg_hba.conf. Navigate to the user that has a method of "trust". Change the method to "md5". A correct, typical line will look like the following: # TYPE DATABASE USER ADDRESS METHOD host all all 127.0.0.1/32 md5
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- VRAU-PG-000165
- Vuln IDs
-
- V-240298
- V-89373
- Rule IDs
-
- SV-240298r879608_rule
- SV-100023
Checks: C-43531r668736_chk
At the command prompt, execute the following command to enter the psql prompt: # cat /storage/db/pgdata/pg_hba.conf If any rows have "trust" specified for the "METHOD" column, this is a finding.
Fix: F-43490r668737_fix
Navigate to and open /storage/db/pgdata/pg_hba.conf. Navigate to the user that has a method of "trust". Change the method to "md5". A correct, typical line will look like the following: # TYPE DATABASE USER ADDRESS METHOD host all all 127.0.0.1/32 md5
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- VRAU-PG-000170
- Vuln IDs
-
- V-240299
- V-89375
- Rule IDs
-
- SV-240299r879609_rule
- SV-100025
Checks: C-43532r668739_chk
At the command prompt, execute the following command: # grep '^\s*ssl\b' /storage/db/pgdata/postgresql.conf If "ssl" is not "on", this is a finding.
Fix: F-43491r668740_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET ssl TO 'on';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- VRAU-PG-000210
- Vuln IDs
-
- V-240300
- V-89377
- Rule IDs
-
- SV-240300r879641_rule
- SV-100027
Checks: C-43533r668876_chk
At the command prompt, execute the following command: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT name,setting FROM pg_settings WHERE name IN ('fsync','full_page_writes','synchronous_commit');" If "fsync", "full_page_writes", and "synchronous_commit" are not all "on", this is a finding. The command will return the following lines: name | setting ---------------------------+--------- fsync | on full_page_writes | on synchronous_commit | on (3 rows)
Fix: F-43492r668743_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET <name> TO 'on';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();" Note: Substitute <name> with the incorrectly set parameter.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- VRAU-PG-000215
- Vuln IDs
-
- V-240301
- V-89379
- Rule IDs
-
- SV-240301r879643_rule
- SV-100029
Checks: C-43534r668878_chk
At the command prompt, execute the following command: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "\dp .*.;" Review the Access Privilege column for all Schemas listed as "information_schema" and "pg_catalog". If access privilege is granted to any users other than "postgres", this is a finding.
Fix: F-43493r668746_fix
At the command prompt, execute the following command: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "REVOKE ALL PRIVILEGES ON <name> FROM <user>;" Replace <name> and <user> with the Access Privilege name and account, respectively, discovered during the check.
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- VRAU-PG-000220
- Vuln IDs
-
- V-240302
- V-89381
- Rule IDs
-
- SV-240302r879649_rule
- SV-100031
Checks: C-43535r668880_chk
Obtain the site data-transfer policy from the ISSO. Review the policies and procedures used to ensure that all vRA data are being protected from unauthorized and unintended information transformation in accordance with site policy. If the site data-transfer policy is not followed, this is a finding.
Fix: F-43494r668749_fix
Modify any code used for moving data from production to development/test systems to comply with the organization-defined data transfer policy, and to ensure copies of production data are not left in unsecured locations.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- VRAU-PG-000250
- Vuln IDs
-
- V-240303
- V-89383
- Rule IDs
-
- SV-240303r879656_rule
- SV-100033
Checks: C-43536r668751_chk
At the command prompt, execute the following command: # ls -l /storage/db/pgdata/serverlog If the file permissions are more permissive than "600", this is a finding.
Fix: F-43495r668752_fix
At the command prompt, enter the following command: chmod 600 /storage/db/pgdata/serverlog
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001844
- Version
- VRAU-PG-000280
- Vuln IDs
-
- V-240304
- V-89385
- Rule IDs
-
- SV-240304r879729_rule
- SV-100035
Checks: C-43537r668754_chk
At the command prompt, execute the following command: # grep '^\s*logging_collector\b' /storage/db/pgdata/postgresql.conf If "logging_collector" is not "on", this is a finding.
Fix: F-43496r668755_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET logging_collector TO 'on';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- VRAU-PG-000290
- Vuln IDs
-
- V-240305
- V-89387
- Rule IDs
-
- SV-240305r879732_rule
- SV-100037
Checks: C-43538r668757_chk
At the command prompt, execute the following command: # grep '^\s*logging_collector\b' /storage/db/pgdata/postgresql.conf If "logging_collector" is not "on", this is a finding.
Fix: F-43497r668758_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET logging_collector TO 'on';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001888
- Version
- VRAU-PG-000295
- Vuln IDs
-
- V-240306
- V-89389
- Rule IDs
-
- SV-240306r668762_rule
- SV-100039
Checks: C-43539r668760_chk
At the command prompt, execute the following command: # grep '^\s*logging_collector\b' /storage/db/pgdata/postgresql.conf If "logging_collector" is not "on", this is a finding.
Fix: F-43498r668761_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET logging_collector TO 'on';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- VRAU-PG-000300
- Vuln IDs
-
- V-240307
- V-89391
- Rule IDs
-
- SV-240307r879747_rule
- SV-100041
Checks: C-43540r668763_chk
At the command prompt, execute the following command: # grep '^\s*log_timezone\b' /storage/db/pgdata/postgresql.conf If "log_timezone" is not "utc", this is a finding.
Fix: F-43499r668764_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_timezone TO 'UTC';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- VRAU-PG-000305
- Vuln IDs
-
- V-240308
- V-89393
- Rule IDs
-
- SV-240308r879748_rule
- SV-100043
Checks: C-43541r668766_chk
At the command prompt, execute the following command: # grep '^\s*log_line_prefix\b' /storage/db/pgdata/postgresql.conf If "log_line_prefix" is not set to "%m %d %u %r %p %l %c", this is a finding.
Fix: F-43500r668767_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_line_prefix TO '%m %d %u %r %p %l %c';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- VRAU-PG-000310
- Vuln IDs
-
- V-240309
- V-89395
- Rule IDs
-
- SV-240309r879753_rule
- SV-100045
Checks: C-43542r668769_chk
At the command prompt, enter the following command: # ls -l /storage/db/pgdata/*conf* If the permissions on any of the listed files are not "600", this is a finding.
Fix: F-43501r668770_fix
At the command prompt, enter the following command: # chmod 600 <file> Note: Replace <file> with the file with incorrect permissions.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-002754
- Version
- VRAU-PG-000320
- Vuln IDs
-
- V-240310
- V-89397
- Rule IDs
-
- SV-240310r879818_rule
- SV-100047
Checks: C-43543r668772_chk
At the command prompt, execute the following command: # grep '^\s*client_encoding\b' /storage/db/pgdata/postgresql.conf If "client_encoding" is not "UTF8", this is a finding.
Fix: F-43502r668773_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET client_encoding TO 'UTF8';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- VRAU-PG-000330
- Vuln IDs
-
- V-240311
- V-89399
- Rule IDs
-
- SV-240311r879827_rule
- SV-100049
Checks: C-43544r855633_chk
Obtain supporting documentation from the ISSO. Review the policies and procedures used to ensure that all security-related upgrades are being installed within the configured time period directed by an authoritative source. If all security-related upgrades are not being installed within the configured time period directed by an authoritative source, this is a finding.
Fix: F-43503r668776_fix
Ensure that patches and updates from an authoritative source are applied at least within 24 hours after they have been received.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VRAU-PG-000335
- Vuln IDs
-
- V-240312
- V-89401
- Rule IDs
-
- SV-240312r879863_rule
- SV-100051
Checks: C-43545r668778_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/pgdata/postgresql.conf If "log_statement" is not "all", this is a finding.
Fix: F-43504r668779_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VRAU-PG-000340
- Vuln IDs
-
- V-240313
- V-89403
- Rule IDs
-
- SV-240313r879863_rule
- SV-100053
Checks: C-43546r668781_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/pgdata/postgresql.conf If "log_statement" is not "all", this is a finding.
Fix: F-43505r668782_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VRAU-PG-000355
- Vuln IDs
-
- V-240314
- V-89405
- Rule IDs
-
- SV-240314r879866_rule
- SV-100055
Checks: C-43547r668784_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/pgdata/postgresql.conf If "log_statement" is not "all", this is a finding.
Fix: F-43506r668785_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VRAU-PG-000360
- Vuln IDs
-
- V-240315
- V-89407
- Rule IDs
-
- SV-240315r879866_rule
- SV-100057
Checks: C-43548r668787_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/pgdata/postgresql.conf If "log_statement" is not "all", this is a finding.
Fix: F-43507r668788_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VRAU-PG-000365
- Vuln IDs
-
- V-240316
- V-89409
- Rule IDs
-
- SV-240316r879866_rule
- SV-100059
Checks: C-43549r668790_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/pgdata/postgresql.conf If "log_statement" is not "all", this is a finding.
Fix: F-43508r668791_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VRAU-PG-000370
- Vuln IDs
-
- V-240317
- V-89411
- Rule IDs
-
- SV-240317r879866_rule
- SV-100061
Checks: C-43550r668793_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/pgdata/postgresql.conf If "log_statement" is not "all", this is a finding.
Fix: F-43509r668794_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VRAU-PG-000375
- Vuln IDs
-
- V-240318
- V-89413
- Rule IDs
-
- SV-240318r879867_rule
- SV-100063
Checks: C-43551r668796_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/pgdata/postgresql.conf If "log_statement" is not "all", this is a finding.
Fix: F-43510r668797_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VRAU-PG-000380
- Vuln IDs
-
- V-240319
- V-89415
- Rule IDs
-
- SV-240319r879867_rule
- SV-100065
Checks: C-43552r668799_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/pgdata/postgresql.conf If "log_statement" is not all, this is a finding.
Fix: F-43511r668800_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VRAU-PG-000395
- Vuln IDs
-
- V-240320
- V-89417
- Rule IDs
-
- SV-240320r879870_rule
- SV-100067
Checks: C-43553r668802_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/pgdata/postgresql.conf If "log_statement" is not "all", this is a finding.
Fix: F-43512r668803_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VRAU-PG-000400
- Vuln IDs
-
- V-240321
- V-89419
- Rule IDs
-
- SV-240321r879870_rule
- SV-100069
Checks: C-43554r668805_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/pgdata/postgresql.conf If "log_statement is not all", this is a finding.
Fix: F-43513r668806_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VRAU-PG-000405
- Vuln IDs
-
- V-240322
- V-89421
- Rule IDs
-
- SV-240322r879872_rule
- SV-100071
Checks: C-43555r668808_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/pgdata/postgresql.conf If "log_statement" is not all, this is a finding.
Fix: F-43514r668809_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VRAU-PG-000410
- Vuln IDs
-
- V-240323
- V-89423
- Rule IDs
-
- SV-240323r879872_rule
- SV-100073
Checks: C-43556r668811_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/pgdata/postgresql.conf If "log_statement is not all", this is a finding.
Fix: F-43515r668812_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VRAU-PG-000415
- Vuln IDs
-
- V-240324
- V-89425
- Rule IDs
-
- SV-240324r879873_rule
- SV-100075
Checks: C-43557r668814_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/pgdata/postgresql.conf If "log_statement" is not "all", this is a finding.
Fix: F-43516r668815_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VRAU-PG-000425
- Vuln IDs
-
- V-240325
- V-89427
- Rule IDs
-
- SV-240325r879874_rule
- SV-100077
Checks: C-43558r668817_chk
At the command prompt, execute the following command: # grep '^\s*log_connections\b' /storage/db/pgdata/postgresql.conf If log_connections is not on, this is a finding.
Fix: F-43517r668818_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_connections TO 'on';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VRAU-PG-000430
- Vuln IDs
-
- V-240326
- V-89429
- Rule IDs
-
- SV-240326r879874_rule
- SV-100079
Checks: C-43559r668820_chk
At the command prompt, execute the following command: # grep '^\s*log_min_messages\b' /storage/db/pgdata/postgresql.conf If "log_min_messages" is not "warning", this is a finding.
Fix: F-43518r668821_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_min_messages TO 'warning';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VRAU-PG-000435
- Vuln IDs
-
- V-240327
- V-89431
- Rule IDs
-
- SV-240327r879875_rule
- SV-100081
Checks: C-43560r668823_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/pgdata/postgresql.conf If "log_statement" is not "all", this is a finding.
Fix: F-43519r668824_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VRAU-PG-000440
- Vuln IDs
-
- V-240328
- V-89433
- Rule IDs
-
- SV-240328r879875_rule
- SV-100083
Checks: C-43561r668826_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/pgdata/postgresql.conf If "log_statement" is not "all", this is a finding.
Fix: F-43520r668827_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VRAU-PG-000445
- Vuln IDs
-
- V-240329
- V-89435
- Rule IDs
-
- SV-240329r879876_rule
- SV-100085
Checks: C-43562r668829_chk
At the command prompt, execute the following command: # grep '^\s*log_connections\b' /storage/db/pgdata/postgresql.conf If "log_connections" is not "on", this is a finding.
Fix: F-43521r668830_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_connections TO 'on';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VRAU-PG-000450
- Vuln IDs
-
- V-240330
- V-89437
- Rule IDs
-
- SV-240330r879877_rule
- SV-100087
Checks: C-43563r668832_chk
At the command prompt, execute the following command: # grep '^\s*log_connections\b' /storage/db/pgdata/postgresql.conf If "log_connections" is not "on", this is a finding.
Fix: F-43522r668833_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_connections TO 'on';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VRAU-PG-000455
- Vuln IDs
-
- V-240331
- V-89439
- Rule IDs
-
- SV-240331r879878_rule
- SV-100089
Checks: C-43564r668835_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/pgdata/postgresql.conf If "log_statement" is not "all", this is a finding.
Fix: F-43523r668836_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VRAU-PG-000460
- Vuln IDs
-
- V-240332
- V-89441
- Rule IDs
-
- SV-240332r879878_rule
- SV-100091
Checks: C-43565r668838_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/pgdata/postgresql.conf If "log_statement" is not "all", this is a finding.
Fix: F-43524r668839_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VRAU-PG-000465
- Vuln IDs
-
- V-240333
- V-89443
- Rule IDs
-
- SV-240333r879879_rule
- SV-100093
Checks: C-43566r668841_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/pgdata/postgresql.conf If "log_statement" is not "all", this is a finding.
Fix: F-43525r668842_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- VRAU-PG-000470
- Vuln IDs
-
- V-240334
- V-89445
- Rule IDs
-
- SV-240334r879885_rule
- SV-100095
Checks: C-43567r668844_chk
At the command prompt, execute the following command: # grep '^\s*ssl_ciphers\b' /storage/db/pgdata/postgresql.conf If "ssl_ciphers" is not "FIPS: +3DES:!aNULL", this is a finding.
Fix: F-43526r668845_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET ssl_ciphers TO 'FIPS: +3DES:!aNULL';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- VRAU-PG-000475
- Vuln IDs
-
- V-240335
- V-89447
- Rule IDs
-
- SV-240335r879885_rule
- SV-100097
Checks: C-43568r668847_chk
At the command prompt, execute the following command: # grep '^\s*ssl_ciphers\b' /storage/db/pgdata/postgresql.conf If "ssl_ciphers" is not "FIPS: +3DES:!aNULL", this is a finding.
Fix: F-43527r668848_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET ssl_ciphers TO 'FIPS: +3DES:!aNULL';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- VRAU-PG-000480
- Vuln IDs
-
- V-240336
- V-89449
- Rule IDs
-
- SV-240336r879885_rule
- SV-100099
Checks: C-43569r668850_chk
At the command prompt, execute the following command: # grep '^\s*ssl_ciphers\b' /storage/db/pgdata/postgresql.conf If "ssl_ciphers" is not "FIPS: +3DES:!aNULL", this is a finding.
Fix: F-43528r668851_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET ssl_ciphers TO 'FIPS: +3DES:!aNULL';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- VRAU-PG-000485
- Vuln IDs
-
- V-240337
- V-89451
- Rule IDs
-
- SV-240337r879886_rule
- SV-100101
Checks: C-43570r668853_chk
At the command prompt, execute the following command: # grep '^\s*syslog_facility\b' /storage/db/pgdata/postgresql.conf If "syslog_facility" is not "local0", this is a finding.
Fix: F-43529r668854_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET syslog_facility TO 'local0';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- VRAU-PG-000490
- Vuln IDs
-
- V-240338
- V-89453
- Rule IDs
-
- SV-240338r879887_rule
- SV-100103
Checks: C-43571r668884_chk
Obtain supporting documentation from the ISSO. Verify that this Security Technical Implementation Guide (STIG) is the most current STIG available for PostgreSQL on vRA Assess all of the organization's vRA installations to ensure that they are fully compliant with the most current PostgreSQL STIG. If the PostgreSQL configuration is not compliant with the most current PostgreSQL STIG, this is a finding.
Fix: F-43530r668857_fix
Install the latest approved security-relevant software updates.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- VRAU-PG-000505
- Vuln IDs
-
- V-240339
- V-89455
- Rule IDs
-
- SV-240339r879616_rule
- SV-100105
Checks: C-43572r668859_chk
At the command prompt, execute the following command: # grep '^\s*ssl_ciphers\b' /storage/db/pgdata/postgresql.conf If "ssl_ciphers" is not "FIPS: +3DES:!aNULL", this is a finding.
Fix: F-43531r668860_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET ssl_ciphers TO 'FIPS: +3DES:!aNULL';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- VRAU-PG-000560
- Vuln IDs
-
- V-240340
- V-89457
- Rule IDs
-
- SV-240340r879588_rule
- SV-100107
Checks: C-43573r668886_chk
At the command prompt, execute the following command: # grep '^\s*port\b' /storage/db/pgdata/postgresql.conf If the port is set to "5432", this is NOT a finding. If the port is not set to "5432" and if the ISSO does not have documentation of an approved variance for using a non-standard port, this is a finding.
Fix: F-43532r668863_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET port TO '5432';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001844
- Version
- VRAU-PG-000595
- Vuln IDs
-
- V-240341
- V-89459
- Rule IDs
-
- SV-240341r879729_rule
- SV-100109
Checks: C-43574r668865_chk
At the command prompt, execute the following command: # grep '^\s*logging_collector\b' /storage/db/pgdata/postgresql.conf If "logging_collector" is not "on", this is a finding.
Fix: F-43533r668866_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET logging_collector TO 'on';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- VRAU-PG-000605
- Vuln IDs
-
- V-240342
- V-89461
- Rule IDs
-
- SV-240342r879756_rule
- SV-100111
Checks: C-43575r855640_chk
At the command prompt, execute the following command: # grep '^\s*port\b' /storage/db/pgdata/postgresql.conf If the port is set to "5432", this is NOT a finding. If the port is not set to "5432" and if the ISSO does not have documentation of an approved variance for using a non-standard port, this is a finding.
Fix: F-43534r668869_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET port TO '5432';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VRAU-PG-000620
- Vuln IDs
-
- V-240343
- V-89463
- Rule IDs
-
- SV-240343r879511_rule
- SV-100113
Checks: C-43576r668871_chk
At the command prompt, execute the following command: # grep '^\s*max_connections\b' /storage/db/pgdata/postgresql.conf If "max_connections" is not "210", this is a finding.
Fix: F-43535r668872_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET max_connections TO '210';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- VRAU-PG-009999
- Vuln IDs
-
- V-258453
- Rule IDs
-
- SV-258453r928885_rule
Checks: C-62193r928884_chk
vRealize Automation 7.x PostgreSQL is no longer supported by the vendor. If the system is running vRealize Automation 7.x PostgreSQL, this is a finding.
Fix: F-53958r798705_fix
Upgrade to a supported version.