PPS9-00-001200 - The EDB Postgres Advanced Server must generate audit records when privileges/permissions are retrieved.

Information

Under some circumstances, it may be useful to monitor who/what is reading privilege/permission/role information. Therefore, it must be possible to configure auditing to do this. DBMSs typically make such information available through views or functions.

This requirement addresses explicit requests for privilege/permission/role membership information. It does not refer to the implicit retrieval of privileges/permissions/role memberships that the DBMS continually performs to determine if any and every action on the database is permitted.

Solution

Execute the following SQL as enterprisedb:

ALTER SYSTEM SET edb_audit_statement = 'all';
SELECT pg_reload_conf();

or

Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_EDB_PGS_Advanced_Server_v9-6_V2R3_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-12c., CAT|II, CCI|CCI-000172, Rule-ID|SV-213567r879561_rule, STIG-ID|PPS9-00-001200, STIG-Legacy|SV-83491, STIG-Legacy|V-68887, Vuln-ID|V-213567

Plugin: PostgreSQLDB

Control ID: 9dc0ec1645dd65419198ba6f650adb1b1361af241f12057486d0ccc3b41817d5