Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000171-DB-000074

    Group
  • The vCenter PostgreSQL service must encrypt passwords for user authentication.

    The DOD standard for authentication is DOD-approved PKI certificates. Authentication based on User ID and Password may be used only when it is not possible to employ a PKI certificate and requires...
    Rule High Severity
  • SRG-APP-000176-DB-000068

    Group
  • The vCenter PostgreSQL service must enforce authorized access to all PKI private keys stored/utilized by PostgreSQL.

    The DOD standard for authentication is DOD-approved PKI certificates. PKI certificate-based authentication is performed by requiring the certificate holder to cryptographically prove possession of ...
    Rule High Severity
  • SRG-APP-000224-DB-000384

    Group
  • The vCenter PostgreSQL service must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.

    One class of man-in-the-middle, or session hijacking, attack involves the adversary guessing at valid session identifiers based on patterns in identifiers already known. The preferred technique fo...
    Rule Medium Severity
  • SRG-APP-000226-DB-000147

    Group
  • The vCenter PostgreSQL service must write log entries to disk prior to returning operation success or failure.

    Failure to a known secure state helps prevent a loss of confidentiality, integrity, or availability in the event of a failure of the information system or a component of the system. Preserving syst...
    Rule Medium Severity
  • SRG-APP-000266-DB-000162

    Group
  • The vCenter PostgreSQL service must provide nonprivileged users with minimal error information.

    Any DBMS or associated application providing too much information in error messages on the screen or printout risks compromising the data and security of the system. The structure and content of er...
    Rule Medium Severity
  • SRG-APP-000356-DB-000314

    Group
  • The vCenter PostgreSQL service must have log collection enabled.

    Without the ability to centrally manage the content captured in the audit records, identification, troubleshooting, and correlation of suspicious behavior would be difficult and could lead to a del...
    Rule Medium Severity
  • SRG-APP-000374-DB-000322

    Group
  • The vCenter PostgreSQL service must use Coordinated Universal Time (UTC) for log timestamps.

    If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. Time stamps generated by PostgreSQL must include date and time. Tim...
    Rule Medium Severity
  • SRG-APP-000503-DB-000350

    Group
  • The vCenter PostgreSQL service must log all connection attempts.

    For completeness of forensic analysis, it is necessary to track successful and failed attempts to log on to PostgreSQL. Setting "log_connections" to "on" will cause each attempted connection to the...
    Rule Medium Severity
  • SRG-APP-000505-DB-000352

    Group
  • The vCenter PostgreSQL service must log all client disconnections.

    Disconnection may be initiated by the user or forced by the system (as in a timeout) or result from a system or network failure. To the greatest extent possible, all disconnections must be logged. ...
    Rule Medium Severity
  • SRG-APP-000515-DB-000318

    Group
  • The vCenter PostgreSQL service must off-load audit data to a separate log management facility.

    Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity. Th...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules