Skip to content

Crunchy Data PostgreSQL Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000499-DB-000331

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000091-DB-000066

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000357-DB-000316

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000090-DB-000065

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000503-DB-000350

    <GroupDescription></GroupDescription>
    Group
  • PostgreSQL must generate audit records when successful logons or connections occur.

    &lt;VulnDiscussion&gt;For completeness of forensic analysis, it is necessary to track who/what (a user or other principal) logs on to PostgreSQL.&l...
    Rule Medium Severity
  • SRG-APP-000099-DB-000043

    <GroupDescription></GroupDescription>
    Group
  • PostgreSQL must produce audit records containing sufficient information to establish the outcome (success or failure) of the events.

    &lt;VulnDiscussion&gt;Information system auditing capability is critical for accurate forensic analysis. Without information about the outcome of e...
    Rule Medium Severity
  • SRG-APP-000456-DB-000390

    <GroupDescription></GroupDescription>
    Group
  • Security-relevant software updates to PostgreSQL must be installed within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).

    &lt;VulnDiscussion&gt;Security flaws with software applications, including database management systems, are discovered daily. Vendors are constantl...
    Rule Medium Severity
  • SRG-APP-000119-DB-000060

    <GroupDescription></GroupDescription>
    Group
  • The audit information produced by PostgreSQL must be protected from unauthorized modification.

    &lt;VulnDiscussion&gt;If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially ma...
    Rule Medium Severity
  • SRG-APP-000023-DB-000001

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000501-DB-000336

    <GroupDescription></GroupDescription>
    Group
  • PostgreSQL must generate audit records when security objects are deleted.

    &lt;VulnDiscussion&gt;The removal of security objects from the database/PostgreSQL would seriously degrade a system's information assurance posture...
    Rule Medium Severity
  • SRG-APP-000091-DB-000325

    <GroupDescription></GroupDescription>
    Group
  • PostgreSQL must initiate session auditing upon startup.

    &lt;VulnDiscussion&gt;Session auditing is for use when a user's activities are under investigation. To ensure the capture of all activity during th...
    Rule Medium Severity
  • PostgreSQL must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.

    &lt;VulnDiscussion&gt;Enterprise environments make account management for applications and databases challenging and complex. A manual process for ...
    Rule High Severity
  • SRG-APP-000266-DB-000162

    <GroupDescription></GroupDescription>
    Group
  • PostgreSQL must provide non-privileged users with error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.

    &lt;VulnDiscussion&gt;Any PostgreSQL or associated application providing too much information in error messages on the screen or printout risks com...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules