III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000357-DB-000316
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
<VulnDiscussion>To ensure sufficient storage capacity for the audit logs, the DBMS must be able to allocate audit record storage capacity. Al...Rule Medium Severity -
SRG-APP-000359-DB-000319
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75% of maximum audit record storage capacity.
<VulnDiscussion>Organizations are required to use a central log management system, so, under normal conditions, the audit space allocated to ...Rule Medium Severity -
SRG-APP-000360-DB-000320
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must provide an immediate real-time alert to appropriate support staff of all audit failure events requiring real-time alerts.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-APP-000378-DB-000365
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.
<VulnDiscussion>Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malici...Rule Medium Severity -
SRG-APP-000380-DB-000360
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must enforce access restrictions associated with changes to the configuration of the EDB Postgres Advanced Server or database(s).
<VulnDiscussion>Failure to provide logical access restrictions associated with changes to configuration may have significant effects on the o...Rule Medium Severity -
SRG-APP-000383-DB-000364
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.
<VulnDiscussion>Use of nonsecure network functions, ports, protocols, and services exposes the system to avoidable threats. A database clust...Rule Medium Severity -
SRG-APP-000389-DB-000372
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must require users to re-authenticate when organization-defined circumstances or situations require re-authentication.
<VulnDiscussion>The DoD standard for authentication of an interactive user is the presentation of a Common Access Card (CAC) or other physica...Rule Medium Severity -
SRG-APP-000427-DB-000385
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs) for the establishment of all encrypted sessions.
<VulnDiscussion>Only DoD-approved external PKIs evaluated to ensure security controls and identity vetting procedures are in place that are s...Rule Medium Severity -
SRG-APP-000428-DB-000386
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest (to include, at a minimum, PII and classified information) on organization-defined information system components.
<VulnDiscussion>DBMSs handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized disclos...Rule Medium Severity -
SRG-APP-000429-DB-000387
<GroupDescription></GroupDescription>Group -
The EDB Postgres Advanced Server must implement cryptographic mechanisms preventing the unauthorized disclosure of organization-defined information at rest on organization-defined information system components.
<VulnDiscussion>DBMSs handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized disclos...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.