Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000266-DB-000162

    <GroupDescription></GroupDescription>
    Group
  • PostgreSQL must provide nonprivileged users with error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.

    &lt;VulnDiscussion&gt;Any DBMS or associated application providing too much information in error messages on the screen or printout risks compromis...
    Rule Medium Severity
  • SRG-APP-000267-DB-000163

    <GroupDescription></GroupDescription>
    Group
  • PostgreSQL must reveal detailed error messages only to the information system security officer (ISSO), information system security manager (ISSM), system administrator (SA), and database administrator (DBA).

    &lt;VulnDiscussion&gt;If the DBMS provides too much information in error logs and administrative messages to the screen, this could lead to comprom...
    Rule Medium Severity
  • SRG-APP-000295-DB-000305

    <GroupDescription></GroupDescription>
    Group
  • PostgreSQL must automatically terminate a user session after organization-defined conditions or trigger events requiring session disconnect.

    &lt;VulnDiscussion&gt;This addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that ...
    Rule Medium Severity
  • SRG-APP-000311-DB-000308

    <GroupDescription></GroupDescription>
    Group
  • PostgreSQL must associate organization-defined types of security labels having organization-defined security label values with information in storage.

    &lt;VulnDiscussion&gt;Without the association of security labels to information, there is no basis for PostgreSQL to make security-related access-c...
    Rule Medium Severity
  • SRG-APP-000313-DB-000309

    <GroupDescription></GroupDescription>
    Group
  • PostgreSQL must associate organization-defined types of security labels having organization-defined security label values with information in process.

    &lt;VulnDiscussion&gt;Without the association of security labels to information, there is no basis for PostgreSQL to make security-related access-c...
    Rule Medium Severity
  • SRG-APP-000314-DB-000310

    <GroupDescription></GroupDescription>
    Group
  • PostgreSQL must associate organization-defined types of security labels having organization-defined security label values with information in transmission.

    &lt;VulnDiscussion&gt;Without the association of security labels to information, there is no basis for PostgreSQL to make security-related access-c...
    Rule Medium Severity
  • SRG-APP-000328-DB-000301

    <GroupDescription></GroupDescription>
    Group
  • PostgreSQL must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.

    &lt;VulnDiscussion&gt;Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have di...
    Rule Medium Severity
  • SRG-APP-000340-DB-000304

    <GroupDescription></GroupDescription>
    Group
  • PostgreSQL must prevent nonprivileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.

    &lt;VulnDiscussion&gt;Preventing nonprivileged users from executing privileged functions mitigates the risk that unauthorized individuals or proces...
    Rule Medium Severity
  • SRG-APP-000342-DB-000302

    <GroupDescription></GroupDescription>
    Group
  • Execution of software modules (to include stored procedures, functions, and triggers) with elevated privileges must be restricted to necessary cases only.

    &lt;VulnDiscussion&gt;In certain situations, to provide required functionality, PostgreSQL needs to execute internal logic (stored procedures, func...
    Rule Medium Severity
  • SRG-APP-000356-DB-000314

    <GroupDescription></GroupDescription>
    Group
  • PostgreSQL must use centralized management of the content captured in audit records generated by all components of PostgreSQL.

    &lt;VulnDiscussion&gt;Without the ability to centrally manage the content captured in the audit records, identification, troubleshooting, and corre...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules