EnterpriseDB Postgres Advanced Server (EPAS) Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to modify security objects occur.
Changes in the database objects (tables, views, procedures, functions) that record and control permissions, privileges, and roles granted to users and roles must be tracked. Without an audit trail,...Rule Medium Severity -
Audit records must be generated when categorized information (e.g., classification levels/security levels) is created.
Changes in categorized information must be tracked. Without an audit trail, unauthorized access to protected data could go undetected. For detailed information on categorizing information, refer t...Rule Medium Severity -
Audit records must be generated when categorized information (e.g., classification levels/security levels) is modified.
Changes in categorized information must be tracked. Without an audit trail, unauthorized access to protected data could go undetected. For detailed information on categorizing information, refer t...Rule Medium Severity -
Audit records must be generated when unsuccessful attempts to create categorized information (e.g., classification levels/security levels) occur.
Changes in categorized information must be tracked. Without an audit trail, unauthorized access to protected data could go undetected. To aid in diagnosis, it is necessary to keep track of failed ...Rule Medium Severity -
Audit records must be generated when categorized information (e.g., classification levels/security levels) is deleted.
Changes in categorized information must be tracked. Without an audit trail, unauthorized access to protected data could go undetected. For detailed information on categorizing information, refer t...Rule Medium Severity -
Audit records must be generated when unsuccessful attempts to delete categorized information (e.g., classification levels/security levels) occur.
Changes in categorized information must be tracked. Without an audit trail, unauthorized access to protected data could go undetected. To aid in diagnosis, it is necessary to keep track of failed ...Rule Medium Severity -
The EDB Postgres Advanced Server must generate audit records for all privileged activities or other system-level access.
Without tracking privileged activity, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. System documentation ...Rule Medium Severity -
The EDB Postgres Advanced Server must generate audit records showing starting and ending time for user access to the database(s).
For completeness of forensic analysis, it is necessary to know how long a user's (or other principal's) connection to the DBMS lasts. This can be achieved by recording disconnections, in addition t...Rule Medium Severity -
The EDB Postgres Advanced Server must generate audit records when concurrent logons/connections by the same user from different workstations occur.
For completeness of forensic analysis, it is necessary to track who logs on to the DBMS. Concurrent connections by the same user from multiple workstations may be valid use of the system; or such ...Rule Medium Severity -
The EDB Postgres Advanced Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.
Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The application must implement cryptographic modules adhering to the higher standards ...Rule Medium Severity -
The EDB Postgres Advanced Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the requirements of the data owner.
Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The application must implement cryptographic modules adhering to the higher standards ...Rule Medium Severity -
SRG-APP-000506-DB-000353
Group -
The EDB Postgres Advanced Server must generate audit records when privileges/permissions are added.
Changes in the permissions, privileges, and roles granted to users and roles must be tracked. Without an audit trail, unauthorized elevation or restriction of individuals' and groups' privileges co...Rule Medium Severity -
SRG-APP-000495-DB-000327
Group -
SRG-APP-000001-DB-000031
Group -
SRG-APP-000023-DB-000001
Group -
SRG-APP-000033-DB-000084
Group -
SRG-APP-000080-DB-000063
Group -
SRG-APP-000089-DB-000064
Group -
SRG-APP-000090-DB-000065
Group -
SRG-APP-000091-DB-000066
Group -
SRG-APP-000091-DB-000325
Group -
SRG-APP-000092-DB-000208
Group -
The EDB Postgres Advanced Server must initiate support of session auditing upon startup.
Session auditing is for use when a user's activities are under investigation. Typically, this DBMS capability would be used in conjunction with comparable monitoring of a user's online session, in...Rule Medium Severity -
SRG-APP-000095-DB-000039
Group -
SRG-APP-000096-DB-000040
Group -
The EDB Postgres Advanced Server must produce audit records containing time stamps to establish when the events occurred.
Information system auditing capability is critical for accurate forensic analysis. Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events re...Rule Medium Severity -
SRG-APP-000097-DB-000041
Group -
The EDB Postgres Advanced Server must produce audit records containing sufficient information to establish where the events occurred.
Information system auditing capability is critical for accurate forensic analysis. Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events r...Rule Medium Severity -
SRG-APP-000098-DB-000042
Group -
The EDB Postgres Advanced Server must produce audit records containing sufficient information to establish the sources (origins) of the events.
Information system auditing capability is critical for accurate forensic analysis. Without establishing the source of the event, it is impossible to establish, correlate, and investigate the events...Rule Medium Severity -
SRG-APP-000099-DB-000043
Group -
SRG-APP-000100-DB-000201
Group -
The EDB Postgres Advanced Server must produce audit records containing sufficient information to establish the identity of any user/subject or process associated with the event.
Information system auditing capability is critical for accurate forensic analysis. Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of us...Rule Medium Severity -
SRG-APP-000101-DB-000044
Group -
SRG-APP-000109-DB-000049
Group -
The EDB Postgres Advanced Server must, by default, shut down upon audit failure, to include the unavailability of space for more audit log records; or must be configurable to shut down upon audit failure.
It is critical that when the DBMS is at risk of failing to process audit logs as required, it take action to mitigate the failure. Audit processing failures include: software/hardware errors; failu...Rule Medium Severity -
SRG-APP-000109-DB-000321
Group -
If passwords are used for authentication, the EDB Postgres Advanced Server must store only hashed, salted representations of passwords.
The DOD standard for authentication is DOD-approved PKI certificates. Authentication based on User ID and Password may be used only when it is not possible to employ a PKI certificate, and require...Rule High Severity -
SRG-APP-000118-DB-000059
Group -
The audit information produced by the EDB Postgres Advanced Server must be protected from unauthorized read access.
If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve. In ...Rule Medium Severity -
SRG-APP-000119-DB-000060
Group -
The audit information produced by the EDB Postgres Advanced Server must be protected from unauthorized modification.
If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve. To ensure the veracit...Rule Medium Severity -
SRG-APP-000120-DB-000061
Group -
The audit information produced by the EDB Postgres Advanced Server must be protected from unauthorized deletion.
If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve. To ensure the veracit...Rule Medium Severity -
SRG-APP-000121-DB-000202
Group -
SRG-APP-000122-DB-000203
Group -
The EDB Postgres Advanced Server must protect its audit configuration from unauthorized modification.
Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on au...Rule Medium Severity -
SRG-APP-000123-DB-000204
Group -
The EDB Postgres Advanced Server must protect its audit features from unauthorized removal.
Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on au...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.