1.2 Install only required packages | CONFIGURATION MANAGEMENT |
1.5 Ensure the Latest Security Patches are Applied | SYSTEM AND SERVICES ACQUISITION |
3.1.2 Ensure the log destinations are set correctly | AUDIT AND ACCOUNTABILITY |
3.1.3 Ensure the logging collector is enabled | AUDIT AND ACCOUNTABILITY |
3.1.4 Ensure the log file destination directory is set correctly | AUDIT AND ACCOUNTABILITY |
3.1.5 Ensure the filename pattern for log files is set correctly | AUDIT AND ACCOUNTABILITY |
3.1.6 Ensure the log file permissions are set correctly | ACCESS CONTROL, MEDIA PROTECTION |
3.1.7 Ensure 'log_truncate_on_rotation' is enabled | AUDIT AND ACCOUNTABILITY |
3.1.8 Ensure the maximum log file lifetime is set correctly | AUDIT AND ACCOUNTABILITY |
3.1.9 Ensure the maximum log file size is set correctly | AUDIT AND ACCOUNTABILITY |
3.1.10 Ensure the correct syslog facility is selected | AUDIT AND ACCOUNTABILITY |
3.1.11 Ensure syslog messages are not suppressed | AUDIT AND ACCOUNTABILITY |
3.1.12 Ensure syslog messages are not lost due to size | AUDIT AND ACCOUNTABILITY |
3.1.13 Ensure the program name for PostgreSQL syslog messages is correct | AUDIT AND ACCOUNTABILITY |
3.1.14 Ensure the correct messages are written to the server log | AUDIT AND ACCOUNTABILITY |
3.1.15 Ensure the correct SQL statements generating errors are recorded | AUDIT AND ACCOUNTABILITY |
3.1.16 Ensure 'debug_print_parse' is disabled | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
3.1.17 Ensure 'debug_print_rewritten' is disabled | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
3.1.18 Ensure 'debug_print_plan' is disabled | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
3.1.19 Ensure 'debug_pretty_print' is enabled | AUDIT AND ACCOUNTABILITY |
3.1.20 Ensure 'log_connections' is enabled | AUDIT AND ACCOUNTABILITY |
3.1.21 Ensure 'log_disconnections' is enabled | AUDIT AND ACCOUNTABILITY |
3.1.22 Ensure 'log_error_verbosity' is set correctly | AUDIT AND ACCOUNTABILITY |
3.1.23 Ensure 'log_hostname' is set correctly | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
3.1.24 Ensure 'log_line_prefix' is set correctly | AUDIT AND ACCOUNTABILITY |
3.1.25 Ensure 'log_statement' is set correctly | AUDIT AND ACCOUNTABILITY |
3.1.26 Ensure 'log_timezone' is set correctly | AUDIT AND ACCOUNTABILITY |
3.2 Ensure the PostgreSQL Audit Extension (pgAudit) is enabled | AUDIT AND ACCOUNTABILITY |
4.3 Ensure excessive administrative privileges are revoked | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
4.4 Lock Out Accounts if Not Currently in Use | ACCESS CONTROL |
4.5 Ensure excessive function privileges are revoked | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
4.6 Ensure excessive DML privileges are revoked | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
4.7 Ensure Row Level Security (RLS) is configured correctly | ACCESS CONTROL, MEDIA PROTECTION |
4.8 Ensure the set_user extension is installed | ACCESS CONTROL |
4.9 Make use of predefined roles | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
5.2 Ensure PostgreSQL is Bound to an IP Address | PLANNING, SYSTEM AND SERVICES ACQUISITION |
5.5 Ensure per-account connection limits are used | ACCESS CONTROL |
5.6 Ensure Password Complexity is configured | IDENTIFICATION AND AUTHENTICATION |
6.1 Understanding attack vectors and runtime parameters | CONFIGURATION MANAGEMENT |
6.2 Ensure 'backend' runtime parameters are configured correctly | CONFIGURATION MANAGEMENT |
6.3 Ensure 'Postmaster' Runtime Parameters are Configured | CONFIGURATION MANAGEMENT |
6.4 Ensure 'SIGHUP' Runtime Parameters are Configured | CONFIGURATION MANAGEMENT |
6.5 Ensure 'Superuser' Runtime Parameters are Configured | CONFIGURATION MANAGEMENT |
6.6 Ensure 'User' Runtime Parameters are Configured | CONFIGURATION MANAGEMENT |
6.8 Ensure TLS is enabled and configured correctly | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
6.9 Ensure the TLSv1.0 and TLSv1.1 Protocols are Disabled | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
6.11 Ensure the pgcrypto extension is installed and configured correctly | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
7.1 Ensure a replication-only user is created and used for streaming replication | ACCESS CONTROL |
7.2 Ensure logging of replication commands is configured | ACCESS CONTROL |
7.3 Ensure base backups are configured and functional | CONTINGENCY PLANNING |