VMW vRealize Operations Manager 6.x PostgreSQL Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +69 −69
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 69
- V-239772 Medium The vROps PostgreSQL DB must limit the number of concurrent sessions to an organization-defined number per user for all accounts and/or account types.
- V-239773 Medium The vROps PostgreSQL DB must provide audit record generation for DoD-defined auditable events within all DBMS/database components.
- V-239774 Medium The vROps PostgreSQL DB must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
- V-239775 Medium The vROps PostgreSQL DB must be able to generate audit records when privileges/permissions are retrieved.
- V-239776 Medium The vROps PostgreSQL DB must initiate session auditing upon startup.
- V-239777 Medium The vROps PostgreSQL DB must produce audit records containing sufficient information to establish what type of events occurred.
- V-239778 Medium The vROps PostgreSQL DB must produce audit records containing time stamps to establish when the events occurred.
- V-239779 Medium The vROps PostgreSQL DB must produce audit records containing sufficient information to establish where the events occurred.
- V-239780 Medium The vROps PostgreSQL DB must produce audit records containing sufficient information to establish the sources (origins) of the events.
- V-239781 Medium The vROps PostgreSQL DB must produce audit records containing sufficient information to establish the outcome (success or failure) of the events.
- V-239782 Medium The vROps PostgreSQL DB must produce audit records containing sufficient information to establish the identity of any user/subject or process associated with the event.
- V-239783 Medium The vROps PostgreSQL DB must include additional, more detailed, organization-defined information in the audit records for audit events identified by type, location, or subject.
- V-239784 Low The vROps PostgreSQL DB must be configurable to overwrite audit log records, oldest first (First-In-First-Out - FIFO), in the event of unavailability of space for more audit log records.
- V-239785 Medium The audit information produced by the vROps PostgreSQL DB must be protected from unauthorized read access.
- V-239786 Medium The audit information produced by the vROps PostgreSQL DB must be protected from unauthorized modification.
- V-239787 Medium The audit information produced by the vROps PostgreSQL DB must be protected from unauthorized deletion.
- V-239788 Medium The vROps PostgreSQL DB must protect its audit features from unauthorized access.
- V-239789 Medium The vROps PostgreSQL DB must protect its audit configuration from unauthorized modification.
- V-239790 Medium The vROps PostgreSQL DB must protect its audit features from unauthorized removal.
- V-239791 Medium vROps PostgreSQL DB objects (including but not limited to tables, indexes, storage, stored procedures, functions, triggers, links to software external to the DBMS, etc.) must be owned by vROps PostgreSQL DB principals authorized for ownership.
- V-239792 Medium The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to the vROps PostgreSQL DB, etc.) must be restricted to authorized users.
- V-239793 Medium Default demonstration and sample databases, database objects, and applications must be removed.
- V-239794 Medium The vROps PostgreSQL DB must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
- V-239795 Medium The vROps PostgreSQL DB must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
- V-239796 Medium If passwords are used for authentication, the vROps PostgreSQL DB must store only hashed, salted representations of passwords.
- V-239797 Medium If passwords are used for authentication, the vROps PostgreSQL DB must transmit only encrypted representations of passwords.
- V-239798 High The vROps PostgreSQL DB must use NIST FIPS 140-2 validated cryptographic modules for cryptographic operations.
- V-239799 Medium In the event of a system failure, the vROps PostgreSQL DB must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes.
- V-239800 Medium The vROps PostgreSQL DB must isolate security functions from non-security functions.
- V-239801 Medium vROps PostgreSQL DB contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.
- V-239802 Medium The vROps PostgreSQL DB must reveal detailed error messages only to the ISSO, ISSM, SA and DBA.
- V-239803 Medium The vROps PostgreSQL DB must utilize centralized management of the content captured in audit records generated by all components of the DBMS.
- V-239804 Medium The vROps PostgreSQL DB must provide centralized configuration of the content to be captured in audit records generated by all components of the DBMS.
- V-239805 Medium The vROps PostgreSQL DB must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75% of maximum audit record storage capacity.
- V-239806 Medium The vROps PostgreSQL DB must provide an immediate real-time alert to appropriate support staff of all audit failure events requiring real-time alerts.
- V-239807 Medium The vROps PostgreSQL DB must record time stamps, in audit records and application data that can be mapped to Coordinated Universal Time (UTC, formerly GMT).
- V-239808 Medium The vROps PostgreSQL DB must generate time stamps, for audit records and application data, with a minimum granularity of one second.
- V-239809 Medium The vROps PostgreSQL DB must enforce access restrictions associated with changes to the configuration of the DBMS or database(s).
- V-239810 Medium The vROps PostgreSQL DB must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.
- V-239811 Medium When invalid inputs are received, the vROps PostgreSQL DB must behave in a predictable and documented manner that reflects organizational and system objectives.
- V-239812 High Security-relevant software updates to the vROps PostgreSQL DB must be installed within the time period directed by an authoritative source (e.g. IAVM, CTOs, DTMs, and STIGs).
- V-239813 Medium The vROps PostgreSQL DB must be able to generate audit records when security objects are accessed.
- V-239814 Medium The vROps PostgreSQL DB must generate audit records when unsuccessful attempts to access security objects occur.
- V-239815 Medium The vROps PostgreSQL DB must generate audit records when privileges/permissions are added.
- V-239816 Medium The vROps PostgreSQL DB must generate audit records when unsuccessful attempts to add privileges/permissions occur.
- V-239817 Medium The vROps PostgreSQL DB must generate audit records when privileges/permissions are modified.
- V-239818 Medium The vROps PostgreSQL DB must generate audit records when unsuccessful attempts to modify privileges/permissions occur.
- V-239819 Medium The vROps PostgreSQL DB must generate audit records when security objects are modified.
- V-239820 Medium The vROps PostgreSQL DB must generate audit records when unsuccessful attempts to modify security objects occur.
- V-239821 Medium The vROps PostgreSQL DB must generate audit records when privileges/permissions are deleted.
- V-239822 Medium The vROps PostgreSQL DB must generate audit records when unsuccessful attempts to delete privileges/permissions occur.
- V-239823 Medium The vROps PostgreSQL DB must generate audit records when security objects are deleted.
- V-239824 Medium The vROps PostgreSQL DB must generate audit records when unsuccessful attempts to delete security objects occur.
- V-239825 Medium The vROps PostgreSQL DB must generate audit records when categories of information (e.g., classification levels/security levels) are deleted.
- V-239826 Medium The vROps PostgreSQL DB must generate audit records when successful logons or connections occur.
- V-239827 Medium The vROps PostgreSQL DB must generate audit records when unsuccessful logons or connection attempts occur.
- V-239828 Medium The vROps PostgreSQL DB must generate audit records for all privileged activities or other system-level access.
- V-239829 Medium The vROps PostgreSQL DB must generate audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.
- V-239830 Medium The vROps PostgreSQL DB must generate audit records showing starting and ending time for user access to the database(s).
- V-239831 Medium The vROps PostgreSQL DB must generate audit records when concurrent logons/connections by the same user from different workstations occur.
- V-239832 Medium The vROps PostgreSQL DB must be able to generate audit records when successful accesses to objects occur.
- V-239833 Medium The vROps PostgreSQL DB must generate audit records when unsuccessful accesses to objects occur.
- V-239834 Medium The vROps PostgreSQL DB must generate audit records for all direct access to the database(s).
- V-239835 High The vROps PostgreSQL DB must implement NIST FIPS 140-2 validated cryptographic modules to provision digital signatures.
- V-239836 High The vROps PostgreSQL DB must implement NIST FIPS 140-2 validated cryptographic modules to generate and validate cryptographic hashes.
- V-239837 High The vROps PostgreSQL DB must implement NIST FIPS 140-2 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owners requirements.
- V-239838 Medium The vROps PostgreSQL DB must off-load audit data to a separate log management facility; this must be continuous and in near real time for systems with a network connection to the storage facility and weekly or more often for stand-alone systems.
- V-239839 Medium The vROps PostgreSQL DB must be configured in accordance with the security configuration settings based on DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.
- V-258458 High The version of vRealize Operations Manager 6.x PostgreSQL running on the system must be a supported version.
Removed rules 69
- V-88215 Medium The vROps PostgreSQL DB must limit the number of concurrent sessions to an organization-defined number per user for all accounts and/or account types.
- V-88217 Medium The vROps PostgreSQL DB must provide audit record generation for DoD-defined auditable events within all DBMS/database components.
- V-88219 Medium The vROps PostgreSQL DB must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.
- V-88221 Medium The vROps PostgreSQL DB must be able to generate audit records when privileges/permissions are retrieved.
- V-88223 Medium The vROps PostgreSQL DB must initiate session auditing upon startup.
- V-88225 Medium The vROps PostgreSQL DB must provide authorized users to capture, record, and log all content related to a user session.
- V-88227 Medium The vROps PostgreSQL DB must produce audit records containing sufficient information to establish what type of events occurred.
- V-88229 Medium The vROps PostgreSQL DB must produce audit records containing time stamps to establish when the events occurred.
- V-88231 Medium The vROps PostgreSQL DB must produce audit records containing sufficient information to establish where the events occurred.
- V-88233 Medium The vROps PostgreSQL DB must produce audit records containing sufficient information to establish the sources (origins) of the events.
- V-88235 Medium The vROps PostgreSQL DB must produce audit records containing sufficient information to establish the outcome (success or failure) of the events.
- V-88237 Medium The vROps PostgreSQL DB must produce audit records containing sufficient information to establish the identity of any user/subject or process associated with the event.
- V-88239 Medium The vROps PostgreSQL DB must include additional, more detailed, organization-defined information in the audit records for audit events identified by type, location, or subject.
- V-88241 Low The vROps PostgreSQL DB must be configurable to overwrite audit log records, oldest first (First-In-First-Out - FIFO), in the event of unavailability of space for more audit log records.
- V-88243 Medium The audit information produced by the vROps PostgreSQL DB must be protected from unauthorized read access.
- V-88245 Medium The audit information produced by the vROps PostgreSQL DB must be protected from unauthorized modification.
- V-88247 Medium The audit information produced by the vROps PostgreSQL DB must be protected from unauthorized deletion.
- V-88249 Medium The vROps PostgreSQL DB must protect its audit features from unauthorized access.
- V-88251 Medium The vROps PostgreSQL DB must protect its audit configuration from unauthorized modification.
- V-88253 Medium The vROps PostgreSQL DB must protect its audit features from unauthorized removal.
- V-88255 Medium vROps PostgreSQL DB objects (including but not limited to tables, indexes, storage, stored procedures, functions, triggers, links to software external to the DBMS, etc.) must be owned by vROps PostgreSQL DB principals authorized for ownership.
- V-88257 Medium The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to the vROps PostgreSQL DB, etc.) must be restricted to authorized users.
- V-88259 Medium Default demonstration and sample databases, database objects, and applications must be removed.
- V-88261 Medium The vROps PostgreSQL DB must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
- V-88263 Medium The vROps PostgreSQL DB must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
- V-88265 Medium If passwords are used for authentication, the vROps PostgreSQL DB must store only hashed, salted representations of passwords.
- V-88267 Medium If passwords are used for authentication, the vROps PostgreSQL DB must transmit only encrypted representations of passwords.
- V-88269 High The vROps PostgreSQL DB must use NIST FIPS 140-2 validated cryptographic modules for cryptographic operations.
- V-88271 Medium In the event of a system failure, the vROps PostgreSQL DB must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes.
- V-88273 Medium The vROps PostgreSQL DB must isolate security functions from non-security functions.
- V-88275 Medium vROps PostgreSQL DB contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.
- V-88277 Medium The vROps PostgreSQL DB must reveal detailed error messages only to the ISSO, ISSM, SA and DBA.
- V-88279 Medium The vROps PostgreSQL DB must utilize centralized management of the content captured in audit records generated by all components of the DBMS.
- V-88281 Medium The vROps PostgreSQL DB must provide centralized configuration of the content to be captured in audit records generated by all components of the DBMS.
- V-88283 Medium The vROps PostgreSQL DB must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75% of maximum audit record storage capacity.
- V-88285 Medium The vROps PostgreSQL DB must provide an immediate real-time alert to appropriate support staff of all audit failure events requiring real-time alerts.
- V-88287 Medium The vROps PostgreSQL DB must record time stamps, in audit records and application data that can be mapped to Coordinated Universal Time (UTC, formerly GMT).
- V-88289 Medium The vROps PostgreSQL DB must generate time stamps, for audit records and application data, with a minimum granularity of one second.
- V-88291 Medium The vROps PostgreSQL DB must enforce access restrictions associated with changes to the configuration of the DBMS or database(s).
- V-88293 Medium The vROps PostgreSQL DB must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.
- V-88295 Medium When invalid inputs are received, the vROps PostgreSQL DB must behave in a predictable and documented manner that reflects organizational and system objectives.
- V-88297 High Security-relevant software updates to the vROps PostgreSQL DB must be installed within the time period directed by an authoritative source (e.g. IAVM, CTOs, DTMs, and STIGs).
- V-88299 Medium The vROps PostgreSQL DB must be able to generate audit records when security objects are accessed.
- V-88301 Medium The vROps PostgreSQL DB must generate audit records when unsuccessful attempts to access security objects occur.
- V-88303 Medium The vROps PostgreSQL DB must generate audit records when privileges/permissions are added.
- V-88305 Medium The vROps PostgreSQL DB must generate audit records when unsuccessful attempts to add privileges/permissions occur.
- V-88307 Medium The vROps PostgreSQL DB must generate audit records when privileges/permissions are modified.
- V-88309 Medium The vROps PostgreSQL DB must generate audit records when unsuccessful attempts to modify privileges/permissions occur.
- V-88311 Medium The vROps PostgreSQL DB must generate audit records when security objects are modified.
- V-88313 Medium The vROps PostgreSQL DB must generate audit records when unsuccessful attempts to modify security objects occur.
- V-88315 Medium The vROps PostgreSQL DB must generate audit records when privileges/permissions are deleted.
- V-88317 Medium The vROps PostgreSQL DB must generate audit records when unsuccessful attempts to delete privileges/permissions occur.
- V-88319 Medium The vROps PostgreSQL DB must generate audit records when security objects are deleted.
- V-88321 Medium The vROps PostgreSQL DB must generate audit records when unsuccessful attempts to delete security objects occur.
- V-88323 Medium The vROps PostgreSQL DB must generate audit records when categories of information (e.g., classification levels/security levels) are deleted.
- V-88325 Medium The vROps PostgreSQL DB must generate audit records when successful logons or connections occur.
- V-88327 Medium The vROps PostgreSQL DB must generate audit records when unsuccessful logons or connection attempts occur.
- V-88329 Medium The vROps PostgreSQL DB must generate audit records for all privileged activities or other system-level access.
- V-88331 Medium The vROps PostgreSQL DB must generate audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.
- V-88333 Medium The vROps PostgreSQL DB must generate audit records showing starting and ending time for user access to the database(s).
- V-88335 Medium The vROps PostgreSQL DB must generate audit records when concurrent logons/connections by the same user from different workstations occur.
- V-88337 Medium The vROps PostgreSQL DB must be able to generate audit records when successful accesses to objects occur.
- V-88339 Medium The vROps PostgreSQL DB must generate audit records when unsuccessful accesses to objects occur.
- V-88341 Medium The vROps PostgreSQL DB must generate audit records for all direct access to the database(s).
- V-88343 High The vROps PostgreSQL DB must implement NIST FIPS 140-2 validated cryptographic modules to provision digital signatures.
- V-88345 High The vROps PostgreSQL DB must implement NIST FIPS 140-2 validated cryptographic modules to generate and validate cryptographic hashes.
- V-88347 High The vROps PostgreSQL DB must implement NIST FIPS 140-2 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owners requirements.
- V-88349 Medium The vROps PostgreSQL DB must off-load audit data to a separate log management facility; this must be continuous and in near real time for systems with a network connection to the storage facility and weekly or more often for stand-alone systems.
- V-88351 Medium The vROps PostgreSQL DB must be configured in accordance with the security configuration settings based on DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- VROM-PG-000005
- Vuln IDs
-
- V-239772
- V-88215
- Rule IDs
-
- SV-239772r879511_rule
- SV-98865
Checks: C-43005r663691_chk
At the command prompt, execute the following command: # grep '^\s*max_connections\b' /storage/db/vcops/vpostgres/data/postgresql.conf If max_connections is not "210", this is a finding.
Fix: F-42964r663692_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET max_connections TO '210';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- VROM-PG-000025
- Vuln IDs
-
- V-239773
- V-88217
- Rule IDs
-
- SV-239773r879559_rule
- SV-98867
Checks: C-43006r663694_chk
At the command prompt, execute the following command: # grep '^\s*log_line_prefix\b' /storage/db/vcops/vpostgres/data/postgresql.conf If log_line_prefix is not set to "%m %d %u %r %p %l %c", this is a finding.
Fix: F-42965r663695_fix
At the command prompt, execute the following commands: # sed -i.bak "/log_line_prefix.*/ d" /storage/db/vcops/vpostgres/data/postgresql.conf # sed -i "$ a log_line_prefix = '%m %d %u %r %p %l %c'" /storage/db/vcops/vpostgres/data/postgresql.conf # su postgres postgres@vRealizeClusterNode:> cd /opt/vmware/vpostgres/current postgres@vRealizeClusterNode:> /opt/vmware/vpostgres/9.3/bin/pg_ctl restart -D /storage/db/vcops/vpostgres/data postgres@vRealizeClusterNode:> exit
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000171
- Version
- VROM-PG-000030
- Vuln IDs
-
- V-239774
- V-88219
- Rule IDs
-
- SV-239774r879560_rule
- SV-98869
Checks: C-43007r663697_chk
At the command prompt, enter the following command: # ls -l /storage/db/vcops/vpostgres/data/*conf* If the permissions on any of the listed files are not "600" or more restrictive, this is a finding.
Fix: F-42966r663698_fix
At the command prompt, enter the following command: # chmod 600 <file> Note: Replace <file> with the file with incorrect permissions.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VROM-PG-000035
- Vuln IDs
-
- V-239775
- V-88221
- Rule IDs
-
- SV-239775r879561_rule
- SV-98871
Checks: C-43008r663700_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/vcops/vpostgres/data/postgresql.conf If log_statement is not set to "all", this is a finding.
Fix: F-42967r663701_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- VROM-PG-000045
- Vuln IDs
-
- V-239776
- V-88223
- Rule IDs
-
- SV-239776r879562_rule
- SV-98873
Checks: C-43009r663703_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/vcops/vpostgres/data/postgresql.conf If log_statement is not set to "all", this is a finding.
Fix: F-42968r663704_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- VROM-PG-000055
- Vuln IDs
-
- V-239777
- V-88227
- Rule IDs
-
- SV-239777r879563_rule
- SV-98877
Checks: C-43010r663706_chk
At the command prompt, execute the following command: # grep '^\s*log_line_prefix\b' /storage/db/vcops/vpostgres/data/postgresql.conf If log_line_prefix is not set to "%m %d %u %r %p %l %c", this is a finding.
Fix: F-42969r663707_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_line_prefix TO '%m %d %u %r %p %l %c';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- VROM-PG-000060
- Vuln IDs
-
- V-239778
- V-88229
- Rule IDs
-
- SV-239778r879564_rule
- SV-98879
Checks: C-43011r663709_chk
At the command prompt, execute the following command: # grep '^\s*log_line_prefix\b' /storage/db/vcops/vpostgres/data/postgresql.conf If log_line_prefix is not set to "%m %d %u %r %p %l %c", this is a finding.
Fix: F-42970r663710_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_line_prefix TO '%m %d %u %r %p %l %c';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- VROM-PG-000065
- Vuln IDs
-
- V-239779
- V-88231
- Rule IDs
-
- SV-239779r879565_rule
- SV-98881
Checks: C-43012r663712_chk
At the command prompt, execute the following command: # grep '^\s*log_line_prefix\b' /storage/db/vcops/vpostgres/data/postgresql.conf If log_line_prefix is not set to "%m %d %u %r %p %l %c", this is a finding.
Fix: F-42971r663713_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_line_prefix TO '%m %d %u %r %p %l %c';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- VROM-PG-000070
- Vuln IDs
-
- V-239780
- V-88233
- Rule IDs
-
- SV-239780r879566_rule
- SV-98883
Checks: C-43013r663715_chk
At the command prompt, execute the following command: # grep '^\s*log_line_prefix\b' /storage/db/vcops/vpostgres/data/postgresql.conf If log_line_prefix is not set to "%m %d %u %r %p %l %c", this is a finding.
Fix: F-42972r663716_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_line_prefix TO '%m %d %u %r %p %l %c';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- VROM-PG-000075
- Vuln IDs
-
- V-239781
- V-88235
- Rule IDs
-
- SV-239781r879567_rule
- SV-98885
Checks: C-43014r663718_chk
At the command prompt, execute the following command: # grep '^\s*log_line_prefix\b' /storage/db/vcops/vpostgres/data/postgresql.conf If log_line_prefix is not set to "%m %d %u %r %p %l %c", this is a finding.
Fix: F-42973r663719_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_line_prefix TO '%m %d %u %r %p %l %c';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- VROM-PG-000080
- Vuln IDs
-
- V-239782
- V-88237
- Rule IDs
-
- SV-239782r879568_rule
- SV-98887
Checks: C-43015r663721_chk
At the command prompt, execute the following command: # grep '^\s*log_line_prefix\b' /storage/db/vcops/vpostgres/data/postgresql.conf If log_line_prefix is not set to "%m %d %u %r %p %l %c", this is a finding.
Fix: F-42974r663722_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_line_prefix TO '%m %d %u %r %p %l %c';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- VROM-PG-000085
- Vuln IDs
-
- V-239783
- V-88239
- Rule IDs
-
- SV-239783r879569_rule
- SV-98889
Checks: C-43016r663724_chk
At the command prompt, execute the following command: # grep '^\s*log_line_prefix\b' /storage/db/vcops/vpostgres/data/postgresql.conf If log_line_prefix is not set to "%m %d %u %r %p %l %c", this is a finding.
Fix: F-42975r663725_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_line_prefix TO '%m %d %u %r %p %l %c';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-5
- Severity
- L
- CCI
- CCI-000140
- Version
- VROM-PG-000095
- Vuln IDs
-
- V-239784
- V-88241
- Rule IDs
-
- SV-239784r879571_rule
- SV-98891
Checks: C-43017r663727_chk
At the command prompt, execute the following command: # grep '^\s*log_truncate_on_rotation\b' /storage/db/vcops/vpostgres/data/postgresql.conf If log_truncate_on_rotation is not set to "on", this is a finding.
Fix: F-42976r663728_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_truncate_on_rotation TO on;" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- VROM-PG-000105
- Vuln IDs
-
- V-239785
- V-88243
- Rule IDs
-
- SV-239785r879576_rule
- SV-98893
Checks: C-43018r663730_chk
At the command prompt, enter the following command: # ls -l /storage/db/vcops/vpostgres/data/pg_log/*.log If the permissions on any log files are not "600", this is a finding.
Fix: F-42977r663731_fix
At the command prompt, enter the following command: # chmod 600 /storage/db/vcops/vpostgres/data/pg_log/<file_name> Replace <file_name> with files to be modified. At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_file_mode TO '0600';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- VROM-PG-000110
- Vuln IDs
-
- V-239786
- V-88245
- Rule IDs
-
- SV-239786r879577_rule
- SV-98895
Checks: C-43019r663733_chk
At the command prompt, enter the following command: # ls -l /storage/db/vcops/vpostgres/data/pg_log/*.log If the owner of any log files is not "postgres:users", this is a finding.
Fix: F-42978r663734_fix
At the command prompt, enter the following command: # chown postgres:users /storage/db/vcops/vpostgres/data/pg_log/<file_name> Replace <file_name> with files to be modified.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- VROM-PG-000115
- Vuln IDs
-
- V-239787
- V-88247
- Rule IDs
-
- SV-239787r879578_rule
- SV-98897
Checks: C-43020r663736_chk
At the command prompt, enter the following command: # ls -l /storage/db/vcops/vpostgres/data/pg_log/*.log If the group-owner of any log files is not "postgres:users", this is a finding.
Fix: F-42979r663737_fix
At the command prompt, enter the following command: # chown postgres:users /storage/db/vcops/vpostgres/data/pg_log/<file_name> Replace <file_name> with files to be modified.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- VROM-PG-000120
- Vuln IDs
-
- V-239788
- V-88249
- Rule IDs
-
- SV-239788r879579_rule
- SV-98899
Checks: C-43021r663739_chk
At the command prompt, enter the following command: # ls -l /storage/db/vcops/vpostgres/data/*conf* /var/vmware/vpostgres/9.3/.pgpass If the permissions on any of the listed files are not "600", this is a finding.
Fix: F-42980r663740_fix
At the command prompt, enter the following command: # chmod 600 <file> Note: Replace <file> with the file with incorrect permissions.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- VROM-PG-000125
- Vuln IDs
-
- V-239789
- V-88251
- Rule IDs
-
- SV-239789r879580_rule
- SV-98901
Checks: C-43022r663742_chk
At the command prompt, enter the following command: # ls -l /storage/db/vcops/vpostgres/data/*conf* /var/vmware/vpostgres/9.3/.pgpass If the owner of any configuration file is not "postgres:users", this is a finding.
Fix: F-42981r663743_fix
At the command prompt, enter the following command: # chown postgres:users <file_name> Replace <file_name> with files to be modified.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001495
- Version
- VROM-PG-000130
- Vuln IDs
-
- V-239790
- V-88253
- Rule IDs
-
- SV-239790r879581_rule
- SV-98903
Checks: C-43023r663745_chk
At the command prompt, enter the following command: # ls -l /storage/db/vcops/vpostgres/data/*conf* /var/vmware/vpostgres/9.3/.pgpass If the group-owner of any configuration file is not "postgres:users", this is a finding.
Fix: F-42982r663746_fix
At the command prompt, enter the following command: # chown postgres:users <file_name> Replace <file_name> with files to be modified.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- VROM-PG-000150
- Vuln IDs
-
- V-239791
- V-88255
- Rule IDs
-
- SV-239791r879586_rule
- SV-98905
Checks: C-43024r663748_chk
At the command prompt, execute the following command: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "\dp;" Review the Access Privileges column. If any tables have permissions to users other than "postgres", this is a finding.
Fix: F-42983r663749_fix
At the command prompt, execute the following command: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER TABLE <tablename> OWNER TO postgres;" Replace <tablename> with the name of the table discovered during the check.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- VROM-PG-000155
- Vuln IDs
-
- V-239792
- V-88257
- Rule IDs
-
- SV-239792r663895_rule
- SV-98907
Checks: C-43025r663751_chk
At the command prompt, execute the following command: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "\du;" If the accounts other than "postgres" and "vc" have create privileges, this is a finding.
Fix: F-42984r663752_fix
At the command prompt, execute the following command: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "REVOKE ALL PRIVILEGES FROM <user>;" Replace <user> with the account discovered during the check.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- VROM-PG-000160
- Vuln IDs
-
- V-239793
- V-88259
- Rule IDs
-
- SV-239793r879587_rule
- SV-98909
Checks: C-43026r663896_chk
At the command prompt, execute the following command: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT datname FROM pg_database WHERE datistemplate = false;" If the output is not the following lines, this is a finding: datname ---------- postgres VCDB (2 rows)
Fix: F-42985r663755_fix
At the command prompt, execute the following command: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "DROP DATABASE IF EXISTS <name>;"
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- VROM-PG-000180
- Vuln IDs
-
- V-239794
- V-88261
- Rule IDs
-
- SV-239794r879588_rule
- SV-98911
Checks: C-43027r663898_chk
At the command prompt, execute the following command: # grep '^\s*port\b' /storage/db/vcops/vpostgres/data/postgresql.conf If the port is set to "5432", this is NOT a finding. If the port is not set to "5432" and if the ISSO does not have documentation of an approved variance for using a non-standard port, this is a finding.
Fix: F-42986r663758_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET port TO '5432';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- VROM-PG-000185
- Vuln IDs
-
- V-239795
- V-88263
- Rule IDs
-
- SV-239795r879589_rule
- SV-98913
Checks: C-43028r663760_chk
At the command prompt, execute the following command to enter the psql prompt: # cat /storage/db/vcops/vpostgres/data/pg_hba.conf If any rows have "trust" specified for the "METHOD" column, this is a finding.
Fix: F-42987r663761_fix
Navigate to and open /storage/db/vcops/vpostgres/data/pg_hba.conf. Navigate to the user that has a method of "trust". Change the method to md5. A correct, typical line will look like the below: # TYPE DATABASE USER ADDRESS METHOD host all all 127.0.0.1/32 md5
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- VROM-PG-000190
- Vuln IDs
-
- V-239796
- V-88265
- Rule IDs
-
- SV-239796r879608_rule
- SV-98915
Checks: C-43029r663763_chk
At the command prompt, execute the following command to enter the psql prompt: # cat /storage/db/vcops/vpostgres/data/pg_hba.conf If any rows have "trust" specified for the "METHOD" column, this is a finding.
Fix: F-42988r663764_fix
Navigate to and open /storage/db/vcops/vpostgres/data/pg_hba.conf. Navigate to the user that has a method of "trust". Change the method to md5. A correct, typical line will look like the below: # TYPE DATABASE USER ADDRESS METHOD host all all 127.0.0.1/32 md5
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- VROM-PG-000195
- Vuln IDs
-
- V-239797
- V-88267
- Rule IDs
-
- SV-239797r879609_rule
- SV-98917
Checks: C-43030r663766_chk
At the command prompt, execute the following command: # grep '^\s*ssl\b' /storage/db/vcops/vpostgres/data/postgresql.conf If ssl is not set to "on", this is a finding.
Fix: F-42989r663767_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET ssl TO 'on';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- VROM-PG-000220
- Vuln IDs
-
- V-239798
- V-88269
- Rule IDs
-
- SV-239798r879616_rule
- SV-98919
Checks: C-43031r663769_chk
At the command prompt, execute the following command: # grep '^\s*ssl_ciphers\b' /storage/db/vcops/vpostgres/data/postgresql.conf If ssl_ciphers is not set to "FIPS: +3DES:!aNULL", this is a finding.
Fix: F-42990r663770_fix
At the command prompt, execute the following commands: # sed -i.bak "/ssl_ciphers\s.*/ d" /storage/db/vcops/vpostgres/data/postgresql.conf # sed -i "$ a ssl_ciphers = 'FIPS: +3DES:\!aNULL'" /storage/db/vcops/vpostgres/data/postgresql.conf # su postgres postgres@vRealizeClusterNode:> cd /opt/vmware/vpostgres/current postgres@vRealizeClusterNode:> /opt/vmware/vpostgres/9.3/bin/pg_ctl restart -D /storage/db/vcops/vpostgres/data postgres@vRealizeClusterNode:> exit
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- VROM-PG-000255
- Vuln IDs
-
- V-239799
- V-88271
- Rule IDs
-
- SV-239799r879641_rule
- SV-98921
Checks: C-43032r663900_chk
At the command prompt, execute the following command: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT name, setting FROM pg_settings WHERE name IN ('fsync','full_page_writes','synchronous_commit');" If "fsync", "full_page_writes", and "synchronous_commit" are not set to "on", this is a finding. The command should return the below lines: name | setting ---------------------------+--------- fsync | on full_page_writes | on synchronous_commit | on (3 rows)
Fix: F-42991r663773_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET <name> TO 'on';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();" Note: Substitute <name> with the incorrectly set parameter.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- VROM-PG-000265
- Vuln IDs
-
- V-239800
- V-88273
- Rule IDs
-
- SV-239800r879643_rule
- SV-98923
Checks: C-43033r663902_chk
At the command prompt, execute the following command: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "\dp.*.;" Review the Access Privilege column for all Schemas listed as information_schema and pg_catalog. If access privilege is granted to any users other than "postgres", this is a finding.
Fix: F-42992r663776_fix
At the command prompt, execute the following command: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "REVOKE ALL PRIVILEGES ON <name> FROM <user>;" Replace <name> and <user> with the Access Privilege name and account, respectively, discovered during the check.
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- VROM-PG-000270
- Vuln IDs
-
- V-239801
- V-88275
- Rule IDs
-
- SV-239801r879649_rule
- SV-98925
Checks: C-43034r663904_chk
Obtain the site data-transfer policy from the ISSO. Review the policies and procedures used to ensure that all vROps data is being protected from unauthorized and unintended information transformation in accordance with site policy. If the site data-transfer policy is not followed, this is a finding.
Fix: F-42993r663779_fix
Modify any code used for moving data from production to development/test systems to comply with the organization-defined site data-transfer policy, and to ensure copies of production data are not left in unsecured locations.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- VROM-PG-000305
- Vuln IDs
-
- V-239802
- V-88277
- Rule IDs
-
- SV-239802r879656_rule
- SV-98927
Checks: C-43035r663781_chk
At the command prompt, execute the following command: # ls -l /storage/db/vcops/vpostgres/data/serverlog If the file permissions are more permissive than "640", this is a finding.
Fix: F-42994r663782_fix
At the command prompt, enter the following command: chmod 640 /storage/db/vcops/vpostgres/data/serverlog
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001844
- Version
- VROM-PG-000355
- Vuln IDs
-
- V-239803
- V-88279
- Rule IDs
-
- SV-239803r879729_rule
- SV-98929
Checks: C-43036r663784_chk
At the command prompt, execute the following command: # grep '^\s*logging_collector\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "logging_collector" is not set to "on", this is a finding.
Fix: F-42995r663785_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET logging_collector TO 'on';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001844
- Version
- VROM-PG-000360
- Vuln IDs
-
- V-239804
- V-88281
- Rule IDs
-
- SV-239804r879729_rule
- SV-98931
Checks: C-43037r663787_chk
At the command prompt, execute the following command: # grep '^\s*logging_collector\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "logging_collector" is not set to "on", this is a finding.
Fix: F-42996r663788_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET logging_collector TO 'on';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- VROM-PG-000370
- Vuln IDs
-
- V-239805
- V-88283
- Rule IDs
-
- SV-239805r879732_rule
- SV-98933
Checks: C-43038r663790_chk
At the command prompt, execute the following command: # grep '^\s*syslog_facility\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "syslog_facility" is not set to "local0", this is a finding.
Fix: F-42997r663791_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET syslog_facility TO 'local0';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001888
- Version
- VROM-PG-000375
- Vuln IDs
-
- V-239806
- V-88285
- Rule IDs
-
- SV-239806r663795_rule
- SV-98935
Checks: C-43039r663793_chk
At the command prompt, execute the following command: # grep '^\s*syslog_facility\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "syslog_facility" is not set to "local0", this is a finding.
Fix: F-42998r663794_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET syslog_facility TO 'local0';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- VROM-PG-000380
- Vuln IDs
-
- V-239807
- V-88287
- Rule IDs
-
- SV-239807r879747_rule
- SV-98937
Checks: C-43040r663796_chk
At the command prompt, execute the following command: # grep '^\s*log_timezone\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "log_timezone" is not set to "UTC", this is a finding.
Fix: F-42999r663797_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_timezone TO 'UTC';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- VROM-PG-000385
- Vuln IDs
-
- V-239808
- V-88289
- Rule IDs
-
- SV-239808r879748_rule
- SV-98939
Checks: C-43041r663799_chk
At the command prompt, execute the following command: # grep '^\s*log_line_prefix\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "log_line_prefix" is not set to "%m %d %u %r %p %l %c", this is a finding.
Fix: F-43000r663800_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_line_prefix TO '%m %d %u %r %p %l %c';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- VROM-PG-000395
- Vuln IDs
-
- V-239809
- V-88291
- Rule IDs
-
- SV-239809r879753_rule
- SV-98941
Checks: C-43042r663802_chk
At the command prompt, enter the following command: # ls -l /storage/db/vcops/vpostgres/data/*conf* /var/vmware/vpostgres/9.3/.pgpass If the permissions on any of the listed files are not "600", this is a finding.
Fix: F-43001r663803_fix
At the command prompt, enter the following command: # chmod 600 <file> Note: Replace <file> with the file with incorrect permissions.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- VROM-PG-000405
- Vuln IDs
-
- V-239810
- V-88293
- Rule IDs
-
- SV-239810r879756_rule
- SV-98943
Checks: C-43043r855648_chk
At the command prompt, execute the following command: # grep '^\s*port\b' /storage/db/vcops/vpostgres/data/postgresql.conf If the port is set to "5432", this is NOT a finding. If the port is not set to "5432" and if the ISSO does not have documentation of an approved variance for using a non-standard port, this is a finding.
Fix: F-43002r663806_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET port TO '5432';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-002754
- Version
- VROM-PG-000455
- Vuln IDs
-
- V-239811
- V-88295
- Rule IDs
-
- SV-239811r879818_rule
- SV-98945
Checks: C-43044r663808_chk
At the command prompt, execute the following command: # grep '^\s*client_encoding\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "client_encoding" is not set to "UTF8", this is a finding.
Fix: F-43003r663809_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET client_encoding TO 'UTF8';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- VROM-PG-000465
- Vuln IDs
-
- V-239812
- V-88297
- Rule IDs
-
- SV-239812r879827_rule
- SV-98947
Checks: C-43045r855651_chk
Obtain supporting documentation from the ISSO. Review the policies and procedures used to ensure that all security-related upgrades are being installed within the configured time period directed by an authoritative source. If all security-related upgrades are not being installed within the configured time period directed by an authoritative source, this is a finding.
Fix: F-43004r663812_fix
Verify that patches and updates from an authoritative source are applied at least within 24 hours after they have been received and has been documented in the supporting documentation.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VROM-PG-000470
- Vuln IDs
-
- V-239813
- V-88299
- Rule IDs
-
- SV-239813r879863_rule
- SV-98949
Checks: C-43046r663814_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "log_statement" is not set to "all", this is a finding.
Fix: F-43005r663815_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VROM-PG-000475
- Vuln IDs
-
- V-239814
- V-88301
- Rule IDs
-
- SV-239814r879863_rule
- SV-98951
Checks: C-43047r663817_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "log_statement" is not set to "all", this is a finding.
Fix: F-43006r663818_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VROM-PG-000490
- Vuln IDs
-
- V-239815
- V-88303
- Rule IDs
-
- SV-239815r879866_rule
- SV-98953
Checks: C-43048r663820_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "log_statement" is not set to "all", this is a finding.
Fix: F-43007r663821_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VROM-PG-000495
- Vuln IDs
-
- V-239816
- V-88305
- Rule IDs
-
- SV-239816r879866_rule
- SV-98955
Checks: C-43049r663823_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "log_statement" is not set to "all", this is a finding.
Fix: F-43008r663824_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VROM-PG-000500
- Vuln IDs
-
- V-239817
- V-88307
- Rule IDs
-
- SV-239817r879866_rule
- SV-98957
Checks: C-43050r663826_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "log_statement" is not set to "all", this is a finding.
Fix: F-43009r663827_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VROM-PG-000505
- Vuln IDs
-
- V-239818
- V-88309
- Rule IDs
-
- SV-239818r879866_rule
- SV-98959
Checks: C-43051r663829_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "log_statement" is not set to "all", this is a finding.
Fix: F-43010r663830_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VROM-PG-000510
- Vuln IDs
-
- V-239819
- V-88311
- Rule IDs
-
- SV-239819r879867_rule
- SV-98961
Checks: C-43052r663832_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "log_statement" is not set to "all", this is a finding.
Fix: F-43011r663833_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VROM-PG-000515
- Vuln IDs
-
- V-239820
- V-88313
- Rule IDs
-
- SV-239820r879867_rule
- SV-98963
Checks: C-43053r663835_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "log_statement" is not set to "all", this is a finding.
Fix: F-43012r663836_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VROM-PG-000530
- Vuln IDs
-
- V-239821
- V-88315
- Rule IDs
-
- SV-239821r879870_rule
- SV-98965
Checks: C-43054r663838_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "log_statement" is not set to "all", this is a finding.
Fix: F-43013r663839_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VROM-PG-000535
- Vuln IDs
-
- V-239822
- V-88317
- Rule IDs
-
- SV-239822r879870_rule
- SV-98967
Checks: C-43055r663841_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "log_statement" is not set to "all", this is a finding.
Fix: F-43014r663842_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VROM-PG-000540
- Vuln IDs
-
- V-239823
- V-88319
- Rule IDs
-
- SV-239823r879872_rule
- SV-98969
Checks: C-43056r663844_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "log_statement" is not set to "all", this is a finding.
Fix: F-43015r663845_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VROM-PG-000545
- Vuln IDs
-
- V-239824
- V-88321
- Rule IDs
-
- SV-239824r879872_rule
- SV-98971
Checks: C-43057r663847_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "log_statement" is not set to "all", this is a finding.
Fix: F-43016r663848_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VROM-PG-000550
- Vuln IDs
-
- V-239825
- V-88323
- Rule IDs
-
- SV-239825r879873_rule
- SV-98973
Checks: C-43058r663850_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "log_statement" is not set to "all", this is a finding.
Fix: F-43017r663851_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VROM-PG-000560
- Vuln IDs
-
- V-239826
- V-88325
- Rule IDs
-
- SV-239826r879874_rule
- SV-98975
Checks: C-43059r663853_chk
At the command prompt, execute the following command: # grep '^\s*log_connections\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "log_connections" is not set to "on", this is a finding.
Fix: F-43018r663854_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_connections TO 'on';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VROM-PG-000565
- Vuln IDs
-
- V-239827
- V-88327
- Rule IDs
-
- SV-239827r879874_rule
- SV-98977
Checks: C-43060r663856_chk
At the command prompt, execute the following command: # grep '^\s*log_min_messages\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "log_min_messages" is not set to "warning", this is a finding.
Fix: F-43019r663857_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_min_messages TO 'warning';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VROM-PG-000570
- Vuln IDs
-
- V-239828
- V-88329
- Rule IDs
-
- SV-239828r879875_rule
- SV-98979
Checks: C-43061r663859_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "log_statement" is not set to "all", this is a finding.
Fix: F-43020r663860_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VROM-PG-000575
- Vuln IDs
-
- V-239829
- V-88331
- Rule IDs
-
- SV-239829r879875_rule
- SV-98981
Checks: C-43062r663862_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "log_statement" is not set to "all", this is a finding.
Fix: F-43021r663863_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VROM-PG-000580
- Vuln IDs
-
- V-239830
- V-88333
- Rule IDs
-
- SV-239830r879876_rule
- SV-98983
Checks: C-43063r663865_chk
At the command prompt, execute the following command: # grep '^\s*log_connections\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "log_connections" is not set to "on", this is a finding.
Fix: F-43022r663866_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_connections TO 'on';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VROM-PG-000585
- Vuln IDs
-
- V-239831
- V-88335
- Rule IDs
-
- SV-239831r879877_rule
- SV-98985
Checks: C-43064r663868_chk
At the command prompt, execute the following command: # grep '^\s*log_connections\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "log_connections" is not set to "on", this is a finding.
Fix: F-43023r663869_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_connections TO 'on';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VROM-PG-000590
- Vuln IDs
-
- V-239832
- V-88337
- Rule IDs
-
- SV-239832r879878_rule
- SV-98987
Checks: C-43065r663871_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "log_statement" is not set to "all", this is a finding.
Fix: F-43024r663872_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VROM-PG-000595
- Vuln IDs
-
- V-239833
- V-88339
- Rule IDs
-
- SV-239833r879878_rule
- SV-98989
Checks: C-43066r663874_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "log_statement" is not set to "all", this is a finding.
Fix: F-43025r663875_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- VROM-PG-000600
- Vuln IDs
-
- V-239834
- V-88341
- Rule IDs
-
- SV-239834r879879_rule
- SV-98991
Checks: C-43067r663877_chk
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "log_statement" is not set to "all", this is a finding.
Fix: F-43026r663878_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- VROM-PG-000605
- Vuln IDs
-
- V-239835
- V-88343
- Rule IDs
-
- SV-239835r879885_rule
- SV-98993
Checks: C-43068r663880_chk
At the command prompt, execute the following command: # grep '^\s*ssl_ciphers\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "ssl_ciphers" is not set to "FIPS: +3DES:!aNULL", this is a finding.
Fix: F-43027r663881_fix
At the command prompt, execute the following commands: # sed -i.bak "/ssl_ciphers\s.*/ d" /storage/db/vcops/vpostgres/data/postgresql.conf # sed -i "$ a ssl_ciphers = 'FIPS: +3DES:\!aNULL'" /storage/db/vcops/vpostgres/data/postgresql.conf # su postgres postgres@vRealizeClusterNode:> cd /opt/vmware/vpostgres/current postgres@vRealizeClusterNode:> /opt/vmware/vpostgres/9.3/bin/pg_ctl restart -D /storage/db/vcops/vpostgres/data postgres@vRealizeClusterNode:> exit
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- VROM-PG-000610
- Vuln IDs
-
- V-239836
- V-88345
- Rule IDs
-
- SV-239836r879885_rule
- SV-98995
Checks: C-43069r663883_chk
At the command prompt, execute the following command: # grep '^\s*ssl_ciphers\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "ssl_ciphers" is not set to "FIPS: +3DES:!aNULL", this is a finding.
Fix: F-43028r663884_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET ssl_ciphers TO 'FIPS: +3DES:!aNULL';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- VROM-PG-000615
- Vuln IDs
-
- V-239837
- V-88347
- Rule IDs
-
- SV-239837r879885_rule
- SV-98997
Checks: C-43070r663886_chk
At the command prompt, execute the following command: # grep '^\s*ssl_ciphers\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "ssl_ciphers" is not set to "FIPS: +3DES:!aNULL", this is a finding.
Fix: F-43029r663887_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET ssl_ciphers TO 'FIPS: +3DES:!aNULL';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- VROM-PG-000620
- Vuln IDs
-
- V-239838
- V-88349
- Rule IDs
-
- SV-239838r879886_rule
- SV-98999
Checks: C-43071r663889_chk
At the command prompt, execute the following command: # grep '^\s*syslog_facility\b' /storage/db/vcops/vpostgres/data/postgresql.conf If "syslog_facility" is not set to "local0", this is a finding.
Fix: F-43030r663890_fix
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET syslog_facility TO 'local0';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- VROM-PG-000625
- Vuln IDs
-
- V-239839
- V-88351
- Rule IDs
-
- SV-239839r879887_rule
- SV-99001
Checks: C-43072r663910_chk
Obtain supporting documentation from the ISSO. Verify that this Security Technical Implementation Guide (STIG) is the most current STIG available for PostgreSQL on vROps. Assess all of the organization's vROps installations to ensure that they are fully compliant with the most current PostgreSQL STIG. If the PostgreSQL configuration is not compliant with the most current PostgreSQL STIG, this is a finding.
Fix: F-43031r663893_fix
Install the latest approved security-relevant software updates and document in the supporting documentation.
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- VROM-PG-009999
- Vuln IDs
-
- V-258458
- Rule IDs
-
- SV-258458r928895_rule
Checks: C-62198r928894_chk
vRealize Operations Manager 6.x PostgreSQL is no longer supported by the vendor. If the system is running vRealize Operations Manager 6.x PostgreSQL, this is a finding.
Fix: F-53958r798705_fix
Upgrade to a supported version.