No profile (default benchmark)
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000099-DB-000043
<GroupDescription></GroupDescription>Group -
PostgreSQL must produce audit records containing sufficient information to establish the outcome (success or failure) of the events.
<VulnDiscussion>Information system auditing capability is critical for accurate forensic analysis. Without information about the outcome of e...Rule Medium Severity -
SRG-APP-000456-DB-000390
<GroupDescription></GroupDescription>Group -
Security-relevant software updates to PostgreSQL must be installed within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
<VulnDiscussion>Security flaws with software applications, including database management systems, are discovered daily. Vendors are constantl...Rule Medium Severity -
SRG-APP-000119-DB-000060
<GroupDescription></GroupDescription>Group -
The audit information produced by PostgreSQL must be protected from unauthorized modification.
<VulnDiscussion>If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially ma...Rule Medium Severity -
SRG-APP-000023-DB-000001
<GroupDescription></GroupDescription>Group -
PostgreSQL must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.
<VulnDiscussion>Enterprise environments make account management for applications and databases challenging and complex. A manual process for ...Rule High Severity -
SRG-APP-000266-DB-000162
<GroupDescription></GroupDescription>Group -
PostgreSQL must provide non-privileged users with error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
<VulnDiscussion>Any PostgreSQL or associated application providing too much information in error messages on the screen or printout risks com...Rule Medium Severity -
SRG-APP-000133-DB-000179
<GroupDescription></GroupDescription>Group -
Privileges to change PostgreSQL software modules must be limited.
<VulnDiscussion>If the system were to allow any user to make changes to software libraries, those changes might be implemented without underg...Rule Medium Severity -
SRG-APP-000133-DB-000179
<GroupDescription></GroupDescription>Group -
PostgreSQL must limit privileges to change functions and triggers, and links to software external to PostgreSQL.
<VulnDiscussion>If the system were to allow any user to make changes to software libraries, those changes might be implemented without underg...Rule Medium Severity -
SRG-APP-000172-DB-000075
<GroupDescription></GroupDescription>Group -
If passwords are used for authentication, PostgreSQL must transmit only encrypted representations of passwords.
<VulnDiscussion>The DoD standard for authentication is DoD-approved PKI certificates. Authentication based on User ID and Password may be us...Rule High Severity -
SRG-APP-000033-DB-000084
<GroupDescription></GroupDescription>Group -
PostgreSQL must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
<VulnDiscussion>Authentication with a DoD-approved PKI certificate does not necessarily imply authorization to access PostgreSQL. To mitigate...Rule High Severity -
SRG-APP-000314-DB-000310
<GroupDescription></GroupDescription>Group -
PostgreSQL must associate organization-defined types of security labels having organization-defined security label values with information in transmission.
<VulnDiscussion>Without the association of security labels to information, there is no basis for PostgreSQL to make security-related access-c...Rule Medium Severity -
SRG-APP-000001-DB-000031
<GroupDescription></GroupDescription>Group -
PostgreSQL must limit the number of concurrent sessions to an organization-defined number per user for all accounts and/or account types.
<VulnDiscussion>Database management includes the ability to control the number of users and user sessions utilizing PostgreSQL. Unlimited con...Rule Medium Severity -
SRG-APP-000133-DB-000362
<GroupDescription></GroupDescription>Group -
The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (functions, trigger procedures, links to software external to PostgreSQL, etc.) must be restricted to authorized users.
<VulnDiscussion>If PostgreSQL were to allow any user to make changes to database structure or logic, those changes might be implemented witho...Rule Medium Severity -
SRG-APP-000180-DB-000115
<GroupDescription></GroupDescription>Group -
PostgreSQL must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).
<VulnDiscussion>Non-organizational users include all information system users other than organizational users, which includes organizational ...Rule Medium Severity -
SRG-APP-000311-DB-000308
<GroupDescription></GroupDescription>Group -
PostgreSQL must associate organization-defined types of security labels having organization-defined security label values with information in storage.
<VulnDiscussion>Without the association of security labels to information, there is no basis for PostgreSQL to make security-related access-c...Rule Medium Severity -
SRG-APP-000251-DB-000160
<GroupDescription></GroupDescription>Group -
PostgreSQL must check the validity of all data inputs except those specifically identified by the organization.
<VulnDiscussion>Invalid user input occurs when a user inserts data or characters into an application's data entry fields and the application ...Rule Medium Severity -
SRG-APP-000251-DB-000391
<GroupDescription></GroupDescription>Group -
PostgreSQL and associated applications must reserve the use of dynamic code execution for situations that require it.
<VulnDiscussion>With respect to database management systems, one class of threat is known as SQL Injection, or more generally, code injection...Rule Medium Severity -
SRG-APP-000251-DB-000392
<GroupDescription></GroupDescription>Group -
PostgreSQL and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.
<VulnDiscussion>With respect to database management systems, one class of threat is known as SQL Injection, or more generally, code injection...Rule Medium Severity -
SRG-APP-000357-DB-000316
<GroupDescription></GroupDescription>Group -
PostgreSQL must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
<VulnDiscussion>To ensure sufficient storage capacity for the audit logs, PostgreSQL must be able to allocate audit record storage capacity. ...Rule Medium Severity -
SRG-APP-000328-DB-000301
<GroupDescription></GroupDescription>Group -
PostgreSQL must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.
<VulnDiscussion>Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have di...Rule Medium Severity -
SRG-APP-000120-DB-000061
<GroupDescription></GroupDescription>Group -
The audit information produced by PostgreSQL must be protected from unauthorized deletion.
<VulnDiscussion>If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially ma...Rule Medium Severity -
SRG-APP-000374-DB-000322
<GroupDescription></GroupDescription>Group -
PostgreSQL must record time stamps, in audit records and application data that can be mapped to Coordinated Universal Time (UTC, formerly GMT).
<VulnDiscussion>If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...Rule Medium Severity -
SRG-APP-000267-DB-000163
<GroupDescription></GroupDescription>Group -
PostgreSQL must reveal detailed error messages only to the ISSO, ISSM, SA, and DBA.
<VulnDiscussion>If PostgreSQL provides too much information in error logs and administrative messages to the screen, this could lead to compr...Rule Medium Severity -
SRG-APP-000090-DB-000065
<GroupDescription></GroupDescription>Group -
PostgreSQL must allow only the Information System Security Manager (ISSM), or individuals or roles appointed by the ISSM, to select which auditable events are to be audited.
<VulnDiscussion>Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...Rule Medium Severity -
SRG-APP-000360-DB-000320
<GroupDescription></GroupDescription>Group -
PostgreSQL must provide an immediate alert to appropriate support staff of all audit log failures.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-APP-000109-DB-000321
<GroupDescription></GroupDescription>Group -
PostgreSQL must be configurable to overwrite audit log records, oldest first (First-In-First-Out [FIFO]), in the event of unavailability of space for more audit log records.
<VulnDiscussion>It is critical that when PostgreSQL is at risk of failing to process audit logs as required, it take action to mitigate the f...Rule Low Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.