Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-89335 | VRAU-PG-000045 | SV-99985r1_rule | Medium |
Description |
---|
Without the capability to capture, record, and log all content related to a user session, investigations into suspicious user activity would be hampered. Typically, this DBMS capability would be used in conjunction with comparable monitoring of a user's online session, involving other software components such as operating systems, web servers and front-end user applications. The current requirement, however, deals specifically with the DBMS. |
STIG | Date |
---|---|
VMW vRealize Automation 7.x PostgreSQL Security Technical Implementation Guide | 2018-10-12 |
Check Text ( C-89027r1_chk ) |
---|
At the command prompt, execute the following command: # grep '^\s*log_statement\b' /storage/db/pgdata/postgresql.conf If "log_statement" is not "all", this is a finding. |
Fix Text (F-96077r1_fix) |
---|
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_statement TO 'all';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();" |