Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000171-DB-000074

    Group
  • If passwords are used for authentication, the EDB Postgres Advanced Server must store only hashed, salted representations of passwords.

    The DoD standard for authentication is DoD-approved PKI certificates. Authentication based on User ID and Password may be used only when it is not possible to employ a PKI certificate, and require...
    Rule High Severity
  • SRG-APP-000172-DB-000075

    Group
  • If passwords are used for authentication, the EDB Postgres Advanced Server must transmit only encrypted representations of passwords.

    The DoD standard for authentication is DoD-approved PKI certificates. Authentication based on User ID and Password may be used only when it is not possible to employ a PKI certificate, and require...
    Rule High Severity
  • SRG-APP-000175-DB-000067

    Group
  • The EDB Postgres Advanced Server, when utilizing PKI-based authentication, must validate certificates by performing RFC 5280-compliant certification path validation.

    The DoD standard for authentication is DoD-approved PKI certificates. A certificate’s certification path is the path from the end entity certificate to a trusted root certification authority (CA)....
    Rule Medium Severity
  • SRG-APP-000176-DB-000068

    Group
  • The EDB Postgres Advanced Server must enforce authorized access to all PKI private keys stored/utilized by the EDB Postgres Advanced Server.

    The DoD standard for authentication is DoD-approved PKI certificates. PKI certificate-based authentication is performed by requiring the certificate holder to cryptographically prove possession of ...
    Rule High Severity
  • SRG-APP-000178-DB-000083

    Group
  • Applications must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.

    The DoD standard for authentication is DoD-approved PKI certificates. Normally, with PKI authentication, the interaction with the user for authentication will be handled by a software component se...
    Rule High Severity
  • SRG-APP-000178-DB-000083

    Group
  • When using command-line tools such as psql, users must use a logon method that does not expose the password.

    To prevent the compromise of authentication information, such as passwords and PINs, during the authentication process, the feedback from the information system must not provide any information tha...
    Rule High Severity
  • SRG-APP-000516-DB-000363

    Group
  • The EDB Postgres Advanced Server password file must not be used.

    The EDB Postgres password file can contain passwords to be used if the connection allows a password (and no password has been specified otherwise). This file contain lines of the following format...
    Rule Medium Severity
  • SRG-APP-000179-DB-000114

    Group
  • The EDB Postgres Advanced Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for all cryptographic operations including generation of cryptographic hashes and data protection.

    Use of weak or not validated cryptographic algorithms undermines the purposes of utilizing encryption and digital signatures to protect data. Weak algorithms can be easily broken and not validated ...
    Rule High Severity
  • SRG-APP-000180-DB-000115

    Group
  • The DBMS must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).

    Non-organizational users include all information system users other than organizational users, which include organizational employees or individuals the organization deems to have equivalent status...
    Rule Medium Severity
  • SRG-APP-000211-DB-000122

    Group
  • The EDB Postgres Advanced Server must separate user functionality (including user interface services) from database management functionality.

    Information system management functionality includes functions necessary to administer databases, network components, workstations, or servers and typically requires privileged user access. The s...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules