Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000360-DB-000320

    <GroupDescription></GroupDescription>
    Group
  • The EDB Postgres Advanced Server must provide an immediate real-time alert to appropriate support staff of all audit log failures.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-APP-000374-DB-000322

    <GroupDescription></GroupDescription>
    Group
  • The EDB Postgres Advanced Server must record time stamps in audit records and application data that can be mapped to Coordinated Universal Time (UTC, formerly GMT).

    &lt;VulnDiscussion&gt;If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...
    Rule Medium Severity
  • SRG-APP-000375-DB-000323

    <GroupDescription></GroupDescription>
    Group
  • The EDB Postgres Advanced Server must generate time stamps for audit records and application data, with a minimum granularity of one second.

    &lt;VulnDiscussion&gt;Without sufficient granularity of time stamps, it is not possible to adequately determine the chronological order of records....
    Rule Medium Severity
  • SRG-APP-000378-DB-000365

    <GroupDescription></GroupDescription>
    Group
  • The EDB Postgres Advanced Server must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.

    &lt;VulnDiscussion&gt;Allowing regular users to install software without explicit privileges creates the risk that untested or potentially maliciou...
    Rule Medium Severity
  • SRG-APP-000380-DB-000360

    <GroupDescription></GroupDescription>
    Group
  • The EDB Postgres Advanced Server must enforce access restrictions associated with changes to the configuration of the EDB Postgres Advanced Server or database(s).

    &lt;VulnDiscussion&gt;Failure to provide logical access restrictions associated with changes to configuration may have significant effects on the o...
    Rule Medium Severity
  • SRG-APP-000381-DB-000361

    <GroupDescription></GroupDescription>
    Group
  • The EDB Postgres Advanced Server must produce audit records of its enforcement of access restrictions associated with changes to the configuration of the EDB Postgres Advanced Server or database(s).

    &lt;VulnDiscussion&gt;Without auditing the enforcement of access restrictions against changes to configuration, it would be difficult to identify a...
    Rule Medium Severity
  • SRG-APP-000383-DB-000364

    <GroupDescription></GroupDescription>
    Group
  • The EDB Postgres Advanced Server must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.

    &lt;VulnDiscussion&gt;Use of nonsecure network functions, ports, protocols, and services exposes the system to avoidable threats. A database cluste...
    Rule Medium Severity
  • SRG-APP-000389-DB-000372

    <GroupDescription></GroupDescription>
    Group
  • The EDB Postgres Advanced Server must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.

    &lt;VulnDiscussion&gt;The DOD standard for authentication of an interactive user is the presentation of a Common Access Card (CAC) or other physica...
    Rule Medium Severity
  • SRG-APP-000416-DB-000380

    <GroupDescription></GroupDescription>
    Group
  • The DBMS must use NSA-approved cryptography to protect classified information in accordance with the requirements of the data owner.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The applicatio...
    Rule Medium Severity
  • SRG-APP-000427-DB-000385

    <GroupDescription></GroupDescription>
    Group
  • The EDB Postgres Advanced Server must only accept end entity certificates issued by DOD PKI or DOD-approved PKI Certification Authorities (CAs) for the establishment of all encrypted sessions.

    &lt;VulnDiscussion&gt;Only DOD-approved external PKIs have been evaluated to ensure that they have security controls and identity vetting procedure...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules