Skip to content

EnterpriseDB Postgres Advanced Server (EPAS) Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The EDB Postgres Advanced Server and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.

    With respect to database management systems, one class of threat is known as SQL Injection, or more generally, code injection. It takes advantage of the dynamic execution capabilities of various pr...
    Rule Medium Severity
  • SRG-APP-000266-DB-000162

    Group
  • SRG-APP-000267-DB-000163

    Group
  • The EDB Postgres Advanced Server must reveal detailed error messages only to the ISSO, ISSM, SA, and DBA.

    If the DBMS provides too much information in error logs and administrative messages to the screen, this could lead to compromise. The structure and content of error messages need to be carefully co...
    Rule Medium Severity
  • SRG-APP-000295-DB-000305

    Group
  • The EDB Postgres Advanced Server must generate time stamps for audit records and application data, with a minimum granularity of one second.

    Without sufficient granularity of time stamps, it is not possible to adequately determine the chronological order of records. Time stamps generated by the DBMS must include date and time. Granular...
    Rule Medium Severity
  • SRG-APP-000378-DB-000365

    Group
  • SRG-APP-000311-DB-000308

    Group
  • The EDB Postgres Advanced Server must associate organization-defined types of security labels having organization-defined security label values with information in storage.

    Without the association of security labels to information, there is no basis for the to make security-related access-control decisions. Security labels are abstractions representing the basic prop...
    Rule Medium Severity
  • SRG-APP-000313-DB-000309

    Group
  • The EDB Postgres Advanced Server must associate organization-defined types of security labels having organization-defined security label values with information in process.

    Without the association of security labels to information, there is no basis for the DBMS to make security-related access-control decisions. Security labels are abstractions representing the basic...
    Rule Medium Severity
  • SRG-APP-000314-DB-000310

    Group
  • SRG-APP-000328-DB-000301

    Group
  • The EDB Postgres Advanced Server must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.

    Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects, and therefore have discretion over who should be authorized to access the object and in whic...
    Rule Medium Severity
  • SRG-APP-000340-DB-000304

    Group
  • The EDB Postgres Advanced Server must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.

    Preventing nonprivileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. System d...
    Rule Medium Severity
  • SRG-APP-000342-DB-000302

    Group
  • SRG-APP-000342-DB-000302

    Group
  • SRG-APP-000357-DB-000316

    Group
  • The EDB Postgres Advanced Server must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.

    In order to ensure sufficient storage capacity for the audit logs, the DBMS must be able to allocate audit record storage capacity. Although another requirement (SRG-APP-000515-DB-000318) mandates ...
    Rule Medium Severity
  • SRG-APP-000359-DB-000319

    Group
  • The EDB Postgres Advanced Server must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75 percent of maximum audit record storage capacity.

    Organizations are required to use a central log management system, so under normal conditions, the audit space allocated to the DBMS on its own server will not cause an issue. However, space will s...
    Rule Medium Severity
  • SRG-APP-000360-DB-000320

    Group
  • The EDB Postgres Advanced Server must provide an immediate real-time alert to appropriate support staff of all audit log failures.

    It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without a real-time alert, security personnel may be unaware of an impe...
    Rule Medium Severity
  • SRG-APP-000374-DB-000322

    Group
  • SRG-APP-000380-DB-000360

    Group
  • The EDB Postgres Advanced Server must enforce access restrictions associated with changes to the configuration of the EDB Postgres Advanced Server or database(s).

    Failure to provide logical access restrictions associated with changes to configuration may have significant effects on the overall security of the system. When dealing with access restrictions pe...
    Rule Medium Severity
  • SRG-APP-000381-DB-000361

    Group
  • The EDB Postgres Advanced Server must produce audit records of its enforcement of access restrictions associated with changes to the configuration of the EDB Postgres Advanced Server or database(s).

    Without auditing the enforcement of access restrictions against changes to configuration, it would be difficult to identify attempted attacks and an audit trail would not be available for forensic ...
    Rule Medium Severity
  • SRG-APP-000383-DB-000364

    Group
  • The EDB Postgres Advanced Server must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.

    Use of nonsecure network functions, ports, protocols, and services exposes the system to avoidable threats. A database cluster listens on a single port (usually 5444 for EDB Postgres Advanced Serve...
    Rule Medium Severity
  • SRG-APP-000389-DB-000372

    Group
  • SRG-APP-000416-DB-000380

    Group
  • The DBMS must use NSA-approved cryptography to protect classified information in accordance with the requirements of the data owner.

    Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The application must implement cryptographic modules adhering to the higher standards ...
    Rule Medium Severity
  • SRG-APP-000427-DB-000385

    Group
  • SRG-APP-000428-DB-000386

    Group
  • The EDB Postgres Advanced Server must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest (to include, at a minimum, PII and classified information) on organization-defined information system components.

    DBMSs handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest. These cryptographic mec...
    Rule Medium Severity
  • SRG-APP-000429-DB-000387

    Group
  • SRG-APP-000441-DB-000378

    Group
  • The EDB Postgres Advanced Server must maintain the confidentiality and integrity of information during preparation for transmission.

    Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, including, for example, during aggregation, at protocol transformation points, an...
    Rule Medium Severity
  • SRG-APP-000442-DB-000379

    Group
  • The EDB Postgres Advanced Server must maintain the confidentiality and integrity of information during reception.

    Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, during aggregation, at protocol transformation points, and during packing/un...
    Rule Medium Severity
  • SRG-APP-000447-DB-000393

    Group
  • SRG-APP-000456-DB-000390

    Group
  • SRG-APP-000492-DB-000332

    Group
  • The EDB Postgres Advanced Server must generate audit records when security objects are accessed.

    Changes to the security configuration must be tracked. This requirement applies to situations where security data is retrieved or modified via data manipulation operations, as opposed to via speci...
    Rule Medium Severity
  • SRG-APP-000492-DB-000333

    Group
  • The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to access security objects occur.

    Changes to the security configuration must be tracked. This requirement applies to situations where security data is retrieved or modified via data manipulation operations, as opposed to via speci...
    Rule Medium Severity
  • SRG-APP-000494-DB-000344

    Group
  • The EDB Postgres Advanced Server must generate audit records when categories of information (e.g., classification levels/security levels) are accessed.

    Changes in categorized information must be tracked. Without an audit trail, unauthorized access to protected data could go undetected. For detailed information on categorizing information, refer t...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules