DISA STIG Crunchy Data PostgreSQL OS v3r1

Audit Details

Name: DISA STIG Crunchy Data PostgreSQL OS v3r1

Updated: 10/21/2024

Authority: DISA STIG

Plugin: Unix

Revision: 1.0

Estimated Item Count: 42

File Details

Filename: DISA_STIG_Crunchy_Data_PostgreSQL_v3r1_OS_Linux.audit

Size: 144 kB

MD5: baa29493bc9ad931ee1073fcc1352fcc
SHA256: 4a15edaafb88d11db40566c4fe88a50eb80b0eb4b310650a6e81539a7a17bd51

Audit Items

DescriptionCategories
CD12-00-000400 - The audit information produced by PostgreSQL must be protected from unauthorized modification.

AUDIT AND ACCOUNTABILITY

CD12-00-000500 - PostgreSQL must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.

ACCESS CONTROL

CD12-00-000700 - Privileges to change PostgreSQL software modules must be limited.

CONFIGURATION MANAGEMENT

CD12-00-000710 - PostgreSQL must limit privileges to change functions and triggers, and links to software external to PostgreSQL.

CONFIGURATION MANAGEMENT

CD12-00-000800 - If passwords are used for authentication, PostgreSQL must transmit only encrypted representations of passwords.

IDENTIFICATION AND AUTHENTICATION

CD12-00-000900 - PostgreSQL must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.

ACCESS CONTROL

CD12-00-001100 - PostgreSQL must associate organization-defined types of security labels having organization-defined security label values with information in transmission.

ACCESS CONTROL

CD12-00-001300 - The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (functions, trigger procedures, links to software external to PostgreSQL, etc.) must be restricted to authorized users.

CONFIGURATION MANAGEMENT

CD12-00-001400 - PostgreSQL must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).

IDENTIFICATION AND AUTHENTICATION

CD12-00-001700 - PostgreSQL must associate organization-defined types of security labels having organization-defined security label values with information in storage.

ACCESS CONTROL

CD12-00-002100 - PostgreSQL must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.

AUDIT AND ACCOUNTABILITY

CD12-00-002200 - PostgreSQL must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.

ACCESS CONTROL

CD12-00-002300 - The audit information produced by PostgreSQL must be protected from unauthorized deletion.

AUDIT AND ACCOUNTABILITY

CD12-00-002500 - PostgreSQL must reveal detailed error messages only to the ISSO, ISSM, SA, and DBA.

SYSTEM AND INFORMATION INTEGRITY

CD12-00-002600 - PostgreSQL must allow only the Information System Security Manager (ISSM), or individuals or roles appointed by the ISSM, to select which auditable events are to be audited.

AUDIT AND ACCOUNTABILITY

CD12-00-003100 - Database objects (including but not limited to tables, indexes, storage, trigger procedures, functions, links to software external to PostgreSQL, etc.) must be owned by database/DBMS principals authorized for ownership.

CONFIGURATION MANAGEMENT

CD12-00-004000 - PostgreSQL must isolate security functions from non-security functions.

SYSTEM AND COMMUNICATIONS PROTECTION

CD12-00-004150 - PostgreSQL must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.

CONFIGURATION MANAGEMENT

CD12-00-004200 - The audit information produced by PostgreSQL must be protected from unauthorized read access.

AUDIT AND ACCOUNTABILITY

CD12-00-004300 - When updates are applied to PostgreSQL software, any software components that have been replaced or made unnecessary must be removed.

SYSTEM AND INFORMATION INTEGRITY

CD12-00-007000 - PostgreSQL, when utilizing PKI-based authentication, must validate certificates by performing RFC 5280-compliant certification path validation.

IDENTIFICATION AND AUTHENTICATION

CD12-00-007200 - PostgreSQL must maintain the confidentiality and integrity of information during preparation for transmission.

SYSTEM AND COMMUNICATIONS PROTECTION

CD12-00-008000 - PostgreSQL must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.

SYSTEM AND COMMUNICATIONS PROTECTION

CD12-00-008200 - PostgreSQL must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owner's requirements.

SYSTEM AND COMMUNICATIONS PROTECTION

CD12-00-008400 - PostgreSQL must prohibit user installation of logic modules (functions, trigger procedures, views, etc.) without explicit privileged status.

CONFIGURATION MANAGEMENT

CD12-00-008500 - PostgreSQL must separate user functionality (including user interface services) from database management functionality.

SYSTEM AND COMMUNICATIONS PROTECTION

CD12-00-009100 - Access to external executables must be disabled or restricted.

CONFIGURATION MANAGEMENT

CD12-00-009200 - Unused database components that are integrated in PostgreSQL and cannot be uninstalled must be disabled.

CONFIGURATION MANAGEMENT

CD12-00-009400 - PostgreSQL must associate organization-defined types of security labels having organization-defined security label values with information in process.

ACCESS CONTROL

CD12-00-009600 - PostgreSQL must enforce access restrictions associated with changes to the configuration of PostgreSQL or database(s).

CONFIGURATION MANAGEMENT

CD12-00-009900 - The system must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75 percent of maximum audit record storage capacity.

AUDIT AND ACCOUNTABILITY

CD12-00-010200 - PostgreSQL must enforce authorized access to all PKI private keys stored/utilized by PostgreSQL.

IDENTIFICATION AND AUTHENTICATION

CD12-00-010700 - PostgreSQL must protect its audit features from unauthorized access.

AUDIT AND ACCOUNTABILITY

CD12-00-011200 - PostgreSQL must protect its audit features from unauthorized removal.

AUDIT AND ACCOUNTABILITY

CD12-00-011500 - PostgreSQL must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).

IDENTIFICATION AND AUTHENTICATION

CD12-00-011800 - PostgreSQL must map the PKI-authenticated identity to an associated user account.

IDENTIFICATION AND AUTHENTICATION

CD12-00-012000 - Access to database files must be limited to relevant processes and to authorized, administrative users.

SYSTEM AND COMMUNICATIONS PROTECTION

CD12-00-012200 - PostgreSQL must protect its audit configuration from unauthorized modification.

AUDIT AND ACCOUNTABILITY

CD12-00-012300 - PostgreSQL must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations.

IDENTIFICATION AND AUTHENTICATION

CD12-00-012800 - The DBMS must be configured on a platform that has a NIST certified FIPS 140-2 or 140-3 installation of OpenSSL.

IDENTIFICATION AND AUTHENTICATION

CD12-00-012900 - PostgreSQL products must be a version supported by the vendor.

SYSTEM AND SERVICES ACQUISITION

DISA_STIG_Crunchy_Data_PostgreSQL_v3r1_OS_Linux.audit from DISA Crunchy Data PostgreSQL v3r1 STIG