Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-88237 | VROM-PG-000080 | SV-98887r1_rule | Medium |
Description |
---|
Information system auditing capability is critical for accurate forensic analysis. Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associated with the events, security personnel cannot determine responsibility for the potentially harmful event. Identifiers (if authenticated or otherwise known) include, but are not limited to, user database tables, primary key values, user names, or process identifiers. |
STIG | Date |
---|---|
VMW vRealize Operations Manager 6.x PostgreSQL Security Technical Implementation Guide | 2018-10-11 |
Check Text ( C-87929r1_chk ) |
---|
At the command prompt, execute the following command: # grep '^\s*log_line_prefix\b' /storage/db/vcops/vpostgres/data/postgresql.conf If log_line_prefix is not set to "%m %d %u %r %p %l %c", this is a finding. |
Fix Text (F-94979r1_fix) |
---|
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_line_prefix TO '%m %d %u %r %p %l %c';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();" |