III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000172-DB-000075
<GroupDescription></GroupDescription>Group -
VMware Postgres must be configured to use Transport Layer Security (TLS).
<VulnDiscussion>The DOD standard for authentication is DOD-approved public key infrastructure (PKI) certificates. Authentication based on use...Rule High Severity -
SRG-APP-000176-DB-000068
<GroupDescription></GroupDescription>Group -
VMware Postgres must enforce authorized access to all public key infrastructure (PKI) private keys.
<VulnDiscussion>The DOD standard for authentication is DOD-approved PKI certificates. PKI certificate-based authentication is performed by re...Rule High Severity -
SRG-APP-000179-DB-000114
<GroupDescription></GroupDescription>Group -
VMware Postgres must use FIPS 140-2 approved Transport Layer Security (TLS) ciphers.
<VulnDiscussion>Use of weak or unvalidated cryptographic algorithms undermines the purposes of using encryption and digital signatures to pro...Rule High Severity -
SRG-APP-000226-DB-000147
<GroupDescription></GroupDescription>Group -
VMware Postgres must write log entries to disk prior to returning operation success or failure.
<VulnDiscussion>Failure to a known secure state helps prevent a loss of confidentiality, integrity, or availability in the event of a failure...Rule Medium Severity -
SRG-APP-000233-DB-000124
<GroupDescription></GroupDescription>Group -
VMware Postgres must not allow schema access to unauthorized accounts.
<VulnDiscussion>Database management systems typically separate security functionality from nonsecurity functionality via separate databases o...Rule Medium Severity -
SRG-APP-000266-DB-000162
<GroupDescription></GroupDescription>Group -
VMware Postgres must provide nonprivileged users with minimal error information.
<VulnDiscussion>Any database management system (DBMS) or associated application providing too much information in error messages on the scree...Rule Medium Severity -
SRG-APP-000356-DB-000314
<GroupDescription></GroupDescription>Group -
VMware Postgres must have log collection enabled.
<VulnDiscussion>Without the ability to centrally manage the content captured in the audit records, identification, troubleshooting, and corre...Rule Medium Severity -
SRG-APP-000359-DB-000319
<GroupDescription></GroupDescription>Group -
VMware Postgres must be configured to log to "stderr".
<VulnDiscussion>Without the ability to centrally manage the content captured in the audit records, identification, troubleshooting, and corre...Rule Medium Severity -
SRG-APP-000359-DB-000319
<GroupDescription></GroupDescription>Group -
"Rsyslog" must be configured to monitor VMware Postgres logs.
<VulnDiscussion>For performance reasons, "rsyslog" file monitoring is preferred over configuring VMware Postgres to send events to a "syslog"...Rule Medium Severity -
SRG-APP-000374-DB-000322
<GroupDescription></GroupDescription>Group -
VMware Postgres must use Coordinated Universal Time (UTC) for log timestamps.
<VulnDiscussion>If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.