EnterpriseDB Postgres Advanced Server (EPAS) Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The EDB Postgres Advanced Server must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
<VulnDiscussion>Preventing nonprivileged users from executing privileged functions mitigates the risk that unauthorized individuals or proces...Rule Medium Severity -
SRG-APP-000342-DB-000302
<GroupDescription></GroupDescription>Group -
Execution of software modules (to include stored procedures, functions, and triggers) with elevated privileges must be restricted to necessary cases only.
<VulnDiscussion>In certain situations, to provide required functionality, a DBMS needs to execute internal logic (stored procedures, function...Rule Medium Severity -
SRG-APP-000342-DB-000302
<GroupDescription></GroupDescription>Group -
Execution of software modules (to include stored procedures, functions, and triggers) with elevated privileges must be restricted to necessary cases only.
<VulnDiscussion>In certain situations, to provide required functionality, a DBMS needs to execute internal logic (stored procedures, function...Rule Medium Severity -
SRG-APP-000357-DB-000316
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
<VulnDiscussion>In order to ensure sufficient storage capacity for the audit logs, the DBMS must be able to allocate audit record storage cap...Rule Medium Severity -
SRG-APP-000359-DB-000319
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75 percent of maximum audit record storage capacity.
<VulnDiscussion>Organizations are required to use a central log management system, so under normal conditions, the audit space allocated to t...Rule Medium Severity -
SRG-APP-000360-DB-000320
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must provide an immediate real-time alert to appropriate support staff of all audit log failures.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-APP-000374-DB-000322
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.
<VulnDiscussion>Allowing regular users to install software without explicit privileges creates the risk that untested or potentially maliciou...Rule Medium Severity -
SRG-APP-000380-DB-000360
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must enforce access restrictions associated with changes to the configuration of the EDB Postgres Advanced Server or database(s).
<VulnDiscussion>Failure to provide logical access restrictions associated with changes to configuration may have significant effects on the o...Rule Medium Severity -
SRG-APP-000381-DB-000361
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must produce audit records of its enforcement of access restrictions associated with changes to the configuration of the EDB Postgres Advanced Server or database(s).
<VulnDiscussion>Without auditing the enforcement of access restrictions against changes to configuration, it would be difficult to identify a...Rule Medium Severity -
SRG-APP-000383-DB-000364
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.
<VulnDiscussion>Use of nonsecure network functions, ports, protocols, and services exposes the system to avoidable threats. A database cluste...Rule Medium Severity -
SRG-APP-000389-DB-000372
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
<VulnDiscussion>The DOD standard for authentication of an interactive user is the presentation of a Common Access Card (CAC) or other physica...Rule Medium Severity -
SRG-APP-000416-DB-000380
<GroupDescription></GroupDescription>Group -
The DBMS must use NSA-approved cryptography to protect classified information in accordance with the requirements of the data owner.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The applicatio...Rule Medium Severity -
SRG-APP-000427-DB-000385
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must only accept end entity certificates issued by DOD PKI or DOD-approved PKI Certification Authorities (CAs) for the establishment of all encrypted sessions.
<VulnDiscussion>Only DOD-approved external PKIs have been evaluated to ensure that they have security controls and identity vetting procedure...Rule Medium Severity -
SRG-APP-000428-DB-000386
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest (to include, at a minimum, PII and classified information) on organization-defined information system components.
<VulnDiscussion>DBMSs handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized disclos...Rule Medium Severity -
SRG-APP-000429-DB-000387
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must implement cryptographic mechanisms preventing the unauthorized disclosure of organization-defined information at rest on organization-defined information system components.
<VulnDiscussion>DBMSs handling data requiring data at rest protections must employ cryptographic mechanisms to prevent unauthorized disclosur...Rule Medium Severity -
SRG-APP-000441-DB-000378
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must maintain the confidentiality and integrity of information during preparation for transmission.
<VulnDiscussion>Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, including...Rule Medium Severity -
SRG-APP-000442-DB-000379
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must maintain the confidentiality and integrity of information during reception.
<VulnDiscussion>Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, duri...Rule Medium Severity -
SRG-APP-000447-DB-000393
<GroupDescription></GroupDescription>Group -
When invalid inputs are received, the EDB Postgres Advanced Server must behave in a predictable and documented manner that reflects organizational and system objectives.
<VulnDiscussion>A common vulnerability is unplanned behavior when invalid inputs are received. This requirement guards against adverse or uni...Rule Medium Severity -
SRG-APP-000456-DB-000390
<GroupDescription></GroupDescription>Group -
Security-relevant software updates to the EDB Postgres Advanced Server must be installed within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
<VulnDiscussion>Security flaws with software applications, including database management systems, are discovered daily. Vendors are constantl...Rule Medium Severity -
SRG-APP-000492-DB-000332
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must generate audit records when security objects are accessed.
<VulnDiscussion>Changes to the security configuration must be tracked. This requirement applies to situations where security data is retriev...Rule Medium Severity -
SRG-APP-000492-DB-000333
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to access security objects occur.
<VulnDiscussion>Changes to the security configuration must be tracked. This requirement applies to situations where security data is retriev...Rule Medium Severity -
SRG-APP-000494-DB-000344
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must generate audit records when categories of information (e.g., classification levels/security levels) are accessed.
<VulnDiscussion>Changes in categorized information must be tracked. Without an audit trail, unauthorized access to protected data could go un...Rule Medium Severity -
SRG-APP-000494-DB-000345
<GroupDescription></GroupDescription>Group -
Audit records must be generated when unsuccessful attempts to access categorized information (e.g., classification levels/security levels) occur.
<VulnDiscussion>Changes in categorized information must be tracked. Without an audit trail, unauthorized access to protected data could go un...Rule Medium Severity -
SRG-APP-000495-DB-000326
<GroupDescription></GroupDescription>Group -
Audit records must be generated when unsuccessful attempts to create categorized information (e.g., classification levels/security levels) occur.
<VulnDiscussion>Changes in categorized information must be tracked. Without an audit trail, unauthorized access to protected data could go un...Rule Medium Severity -
SRG-APP-000498-DB-000347
<GroupDescription></GroupDescription>Group -
Audit records must be generated when unsuccessful attempts to modify categorized information (e.g., classification levels/security levels) occur.
<VulnDiscussion>Changes in categorized information must be tracked. Without an audit trail, unauthorized access to protected data could go un...Rule Medium Severity -
SRG-APP-000499-DB-000330
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.