Skip to content

Crunchy Data PostgreSQL Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000515-DB-000318

    Group
  • SRG-APP-000224-DB-000384

    Group
  • SRG-APP-000148-DB-000103

    Group
  • PostgreSQL must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).

    To ensure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational use...
    Rule Medium Severity
  • SRG-APP-000295-DB-000305

    Group
  • SRG-APP-000340-DB-000304

    Group
  • SRG-APP-000177-DB-000069

    Group
  • PostgreSQL must map the PKI-authenticated identity to an associated user account.

    The DoD standard for authentication is DoD-approved PKI certificates. Once a PKI certificate has been validated, it must be mapped to PostgreSQL user account for the authenticated identity to be me...
    Rule Medium Severity
  • SRG-APP-000243-DB-000128

    Group
  • Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.

    Applications, including PostgreSQL, must prevent unauthorized and unintended information transfer via shared system resources. Data used for the development and testing of applications often invol...
    Rule Medium Severity
  • SRG-APP-000243-DB-000374

    Group
  • Access to database files must be limited to relevant processes and to authorized, administrative users.

    Applications, including PostgreSQL, must prevent unauthorized and unintended information transfer via shared system resources. Permitting only DBMS processes and authorized, administrative users to...
    Rule Medium Severity
  • SRG-APP-000122-DB-000203

    Group
  • SRG-APP-000179-DB-000114

    Group
  • SRG-APP-000502-DB-000348

    Group
  • Audit records must be generated when categorized information (e.g., classification levels/security levels) is deleted.

    Changes in categorized information must be tracked. Without an audit trail, unauthorized access to protected data could go undetected. For detailed information on categorizing information, refer t...
    Rule Medium Severity
  • SRG-APP-000507-DB-000356

    Group
  • PostgreSQL must generate audit records when successful accesses to objects occur.

    Without tracking all or selected types of access to all or selected objects (tables, views, procedures, functions, etc.), it would be difficult to establish, correlate, and investigate the events r...
    Rule Medium Severity
  • SRG-APP-000508-DB-000358

    Group
  • PostgreSQL must generate audit records for all direct access to the database(s).

    In this context, direct access is any query, command, or call to the DBMS that comes from any source other than the application(s) that it supports. Examples would be the command line or a database...
    Rule Medium Severity
  • SRG-APP-000179-DB-000114

    Group
  • The DBMS must be configured on a platform that has a NIST certified FIPS 140-2 or 140-3 installation of OpenSSL.

    PostgreSQL uses OpenSSL for the underlying encryption layer. It must be installed on an operating system that contains a certified FIPS 140-2 or 140-3 distribution of OpenSSL. For other operating s...
    Rule High Severity
  • SRG-APP-000456-DB-000400

    Group
  • PostgreSQL products must be a version supported by the vendor.

    Unsupported commercial and database systems should not be used because fixes to newly identified bugs will not be implemented by the vendor. The lack of support can result in potential vulnerabilit...
    Rule High Severity
  • PostgreSQL must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owner’s requirements.

    Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The application must implement cryptographic modules adhering to the higher standards ...
    Rule High Severity
  • PostgreSQL must use NSA-approved cryptography to protect classified information in accordance with the data owner’s requirements.

    Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The application must implement cryptographic modules adhering to the higher standards ...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules