Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000357-DB-000316

    Group
  • PostgreSQL must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.

    In order to ensure sufficient storage capacity for the audit logs, PostgreSQL must be able to allocate audit record storage capacity. Although another requirement (SRG-APP-000515-DB-000318) mandate...
    Rule Medium Severity
  • SRG-APP-000359-DB-000319

    Group
  • PostgreSQL must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75 percent of maximum audit record storage capacity.

    Organizations are required to use a central log management system so under normal conditions, the audit space allocated to PostgreSQL on its own server will not be an issue. However, space will sti...
    Rule Medium Severity
  • SRG-APP-000360-DB-000320

    Group
  • PostgreSQL must provide an immediate real-time alert to appropriate support staff of all audit log failures.

    It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without a real-time alert, security personnel may be unaware of an impe...
    Rule Medium Severity
  • SRG-APP-000374-DB-000322

    Group
  • PostgreSQL must record time stamps in audit records and application data that can be mapped to Coordinated Universal Time (UTC), formerly Greenwich Mean Time (GMT).

    If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. Time stamps generated by PostgreSQL must include date and time. Tim...
    Rule Medium Severity
  • SRG-APP-000375-DB-000323

    Group
  • PostgreSQL must generate time stamps for audit records and application data with a minimum granularity of one second.

    Without sufficient granularity of time stamps, it is not possible to adequately determine the chronological order of records. Time stamps generated by PostgreSQL must include date and time. Granul...
    Rule Medium Severity
  • SRG-APP-000378-DB-000365

    Group
  • PostgreSQL must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.

    Allowing regular users to install software without explicit privileges creates the risk that untested or potentially malicious software will be installed on the system. Explicit privileges (escalat...
    Rule Medium Severity
  • SRG-APP-000380-DB-000360

    Group
  • PostgreSQL must enforce access restrictions associated with changes to the configuration of the DBMS or database(s).

    Failure to provide logical access restrictions associated with changes to configuration may have significant effects on the overall security of the system. When dealing with access restrictions pe...
    Rule Medium Severity
  • SRG-APP-000381-DB-000361

    Group
  • PostgreSQL must produce audit records of its enforcement of access restrictions associated with changes to the configuration of PostgreSQL or database(s).

    Without auditing the enforcement of access restrictions against changes to configuration, it would be difficult to identify attempted attacks and an audit trail would not be available for forensic ...
    Rule Medium Severity
  • SRG-APP-000383-DB-000364

    Group
  • PostgreSQL must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accordance with the Ports, Protocols, and Services Management (PPSM) guidance.

    Use of nonsecure network functions, ports, protocols, and services exposes the system to avoidable threats.
    Rule Medium Severity
  • SRG-APP-000389-DB-000372

    Group
  • PostgreSQL must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.

    The DOD standard for authentication of an interactive user is the presentation of a Common Access Card (CAC) or other physical token bearing a valid, current, DOD-issued Public Key Infrastructure (...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules