Crunchy Data PostgreSQL Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000340-DB-000304
<GroupDescription></GroupDescription>Group -
PostgreSQL must prevent non-privileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
<VulnDiscussion>Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or proce...Rule High Severity -
SRG-APP-000177-DB-000069
<GroupDescription></GroupDescription>Group -
PostgreSQL must map the PKI-authenticated identity to an associated user account.
<VulnDiscussion>The DoD standard for authentication is DoD-approved PKI certificates. Once a PKI certificate has been validated, it must be m...Rule Medium Severity -
SRG-APP-000243-DB-000128
<GroupDescription></GroupDescription>Group -
Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.
<VulnDiscussion>Applications, including PostgreSQL, must prevent unauthorized and unintended information transfer via shared system resources...Rule Medium Severity -
SRG-APP-000243-DB-000374
<GroupDescription></GroupDescription>Group -
Access to database files must be limited to relevant processes and to authorized, administrative users.
<VulnDiscussion>Applications, including PostgreSQL, must prevent unauthorized and unintended information transfer via shared system resources...Rule Medium Severity -
SRG-APP-000122-DB-000203
<GroupDescription></GroupDescription>Group -
PostgreSQL must protect its audit configuration from unauthorized modification.
<VulnDiscussion>Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, pro...Rule Medium Severity -
SRG-APP-000179-DB-000114
<GroupDescription></GroupDescription>Group -
PostgreSQL must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.
<VulnDiscussion>Use of weak or not validated cryptographic algorithms undermines the purposes of utilizing encryption and digital signatures ...Rule High Severity -
SRG-APP-000502-DB-000348
<GroupDescription></GroupDescription>Group -
Audit records must be generated when categorized information (e.g., classification levels/security levels) is deleted.
<VulnDiscussion>Changes in categorized information must be tracked. Without an audit trail, unauthorized access to protected data could go un...Rule Medium Severity -
SRG-APP-000507-DB-000356
<GroupDescription></GroupDescription>Group -
PostgreSQL must generate audit records when successful accesses to objects occur.
<VulnDiscussion>Without tracking all or selected types of access to all or selected objects (tables, views, procedures, functions, etc.), it ...Rule Medium Severity -
SRG-APP-000508-DB-000358
<GroupDescription></GroupDescription>Group -
PostgreSQL must generate audit records for all direct access to the database(s).
<VulnDiscussion>In this context, direct access is any query, command, or call to the DBMS that comes from any source other than the applicati...Rule Medium Severity -
SRG-APP-000179-DB-000114
<GroupDescription></GroupDescription>Group -
The DBMS must be configured on a platform that has a NIST certified FIPS 140-2 or 140-3 installation of OpenSSL.
<VulnDiscussion>PostgreSQL uses OpenSSL for the underlying encryption layer. It must be installed on an operating system that contains a cert...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.