Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-239810 | VROM-PG-000405 | SV-239810r879756_rule | Medium |
Description |
---|
Use of nonsecure network functions, ports, protocols, and services exposes the system to avoidable threats. |
STIG | Date |
---|---|
VMW vRealize Operations Manager 6.x PostgreSQL Security Technical Implementation Guide | 2023-09-12 |
Check Text ( C-43043r855648_chk ) |
---|
At the command prompt, execute the following command: # grep '^\s*port\b' /storage/db/vcops/vpostgres/data/postgresql.conf If the port is set to "5432", this is NOT a finding. If the port is not set to "5432" and if the ISSO does not have documentation of an approved variance for using a non-standard port, this is a finding. |
Fix Text (F-43002r663806_fix) |
---|
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET port TO '5432';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();" |