Skip to content

PostgreSQL 9.x Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000427-DB-000385

    Group
  • PostgreSQL must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs) for the establishment of all encrypted sessions.

    Only DoD-approved external PKIs have been evaluated to ensure that they have security controls and identity vetting procedures in place which are sufficient for DoD systems to rely on the identity ...
    Rule Medium Severity
  • SRG-APP-000095-DB-000039

    Group
  • PostgreSQL must produce audit records containing sufficient information to establish what type of events occurred.

    Information system auditing capability is critical for accurate forensic analysis. Without establishing what type of event occurred, it would be difficult to establish, correlate, and investigate t...
    Rule Medium Severity
  • SRG-APP-000429-DB-000387

    Group
  • PostgreSQL must implement cryptographic mechanisms preventing the unauthorized disclosure of organization-defined information at rest on organization-defined information system components.

    PostgreSQLs handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest. These cryptograph...
    Rule Medium Severity
  • SRG-APP-000220-DB-000149

    Group
  • SRG-APP-000121-DB-000202

    Group
  • PostgreSQL must protect its audit features from unauthorized access.

    Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Depending upon the log format and application, system and application log tools may ...
    Rule Medium Severity
  • SRG-APP-000096-DB-000040

    Group
  • PostgreSQL must produce audit records containing time stamps to establish when the events occurred.

    Information system auditing capability is critical for accurate forensic analysis. Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events re...
    Rule Medium Severity
  • SRG-APP-000123-DB-000204

    Group
  • PostgreSQL must protect its audit features from unauthorized removal.

    Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on au...
    Rule Medium Severity
  • SRG-APP-000515-DB-000318

    Group
  • SRG-APP-000224-DB-000384

    Group
  • PostgreSQL must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.

    One class of man-in-the-middle, or session hijacking, attack involves the adversary guessing at valid session identifiers based on patterns in identifiers already known. The preferred technique fo...
    Rule Medium Severity
  • SRG-APP-000148-DB-000103

    Group
  • SRG-APP-000295-DB-000305

    Group
  • PostgreSQL must automatically terminate a user session after organization-defined conditions or trigger events requiring session disconnect.

    This addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that are associated with communications sessions (i.e., network disconnect). ...
    Rule Medium Severity
  • SRG-APP-000340-DB-000304

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules