Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-240342 | VRAU-PG-000605 | SV-240342r879756_rule | Medium |
Description |
---|
Use of nonsecure network functions, ports, protocols, and services exposes the system to avoidable threats. |
STIG | Date |
---|---|
VMW vRealize Automation 7.x PostgreSQL Security Technical Implementation Guide | 2023-09-20 |
Check Text ( C-43575r855640_chk ) |
---|
At the command prompt, execute the following command: # grep '^\s*port\b' /storage/db/pgdata/postgresql.conf If the port is set to "5432", this is NOT a finding. If the port is not set to "5432" and if the ISSO does not have documentation of an approved variance for using a non-standard port, this is a finding. |
Fix Text (F-43534r668869_fix) |
---|
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET port TO '5432';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();" |