III - Administrative Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000001-DB-000031
<GroupDescription></GroupDescription>Group -
VMware Postgres must limit the number of connections.
<VulnDiscussion>Database management includes the ability to control the number of users and user sessions utilizing a database management sys...Rule Medium Severity -
SRG-APP-000089-DB-000064
<GroupDescription></GroupDescription>Group -
VMware Postgres log files must contain required fields.
<VulnDiscussion>Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events r...Rule Medium Severity -
SRG-APP-000090-DB-000065
<GroupDescription></GroupDescription>Group -
VMware Postgres configuration files must not be accessible by unauthorized users.
<VulnDiscussion>VMware Postgres has a few configuration files that directly control the security posture of the database management system (D...Rule Medium Severity -
SRG-APP-000109-DB-000321
<GroupDescription></GroupDescription>Group -
VMware Postgres must be configured to overwrite older logs when necessary.
<VulnDiscussion>Without proper configuration, log files for VMware Postgres can grow without bound, filling the partition and potentially aff...Rule Medium Severity -
SRG-APP-000118-DB-000059
<GroupDescription></GroupDescription>Group -
The VMware Postgres database must protect log files from unauthorized access and modification.
<VulnDiscussion>If audit data were to become compromised, competent forensic analysis and discovery of the true source of potentially malicio...Rule Medium Severity -
SRG-APP-000133-DB-000200
<GroupDescription></GroupDescription>Group -
All vCenter database (VCDB) tables must be owned by the "vc" user account.
<VulnDiscussion>Within the database, object ownership implies full privileges to the owned object, including the privilege to assign access t...Rule Medium Severity -
SRG-APP-000133-DB-000362
<GroupDescription></GroupDescription>Group -
VMware Postgres must limit modify privileges to authorized accounts.
<VulnDiscussion>If VMware Postgres were to allow any user to make changes to database structure or logic, those changes might be implemented ...Rule Medium Severity -
SRG-APP-000142-DB-000094
<GroupDescription></GroupDescription>Group -
VMware Postgres must be configured to use the correct port.
<VulnDiscussion>To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...Rule Medium Severity -
SRG-APP-000148-DB-000103
<GroupDescription></GroupDescription>Group -
VMware Postgres must require authentication on all connections.
<VulnDiscussion>To ensure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...Rule Low Severity -
SRG-APP-000171-DB-000074
<GroupDescription></GroupDescription>Group -
The vPostgres database must use "md5" for authentication.
<VulnDiscussion>The DOD standard for authentication is DOD-approved public key infrastructure (PKI) certificates. Authentication based on us...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.