VCPG-70-000011 - VMware Postgres must be configured to use Transport Layer Security (TLS).

Information

The DOD standard for authentication is DOD-approved public key infrastructure (PKI) certificates. Authentication based on user ID and password may be used only when it is not possible to employ a PKI certificate.

In such cases, passwords, must be protected at all times, and encryption is the standard method for protecting passwords during transmission.

VMware Postgres is configured out of the box to require TLS connections with remote clients. As an embedded database and available only on 'localhost' for standalone vCenter Server Appliances (VCSAs), TLS connections are used only in high-availability deployments for connections between a primary and a standby. This configuration must be verified and maintained.

Satisfies: SRG-APP-000172-DB-000075, SRG-APP-000442-DB-000379

Solution

At the command prompt, run the following commands:

# /opt/vmware/vpostgres/current/bin/psql -U postgres -c 'ALTER SYSTEM SET ssl TO 'on';'

# /opt/vmware/vpostgres/current/bin/psql -U postgres -c 'SELECT pg_reload_conf();'

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_7-0_Y23M07_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|IA-5(1)(c), 800-53|SC-8(2), CAT|I, CCI|CCI-000197, CCI|CCI-002422, Rule-ID|SV-256601r887589_rule, STIG-ID|VCPG-70-000011, Vuln-ID|V-256601

Plugin: Unix

Control ID: 242f2b68eac8826687c3213f0aa996698c152767f153e009e7575ea30aa217a3