Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-239205 | VCPG-67-000013 | SV-239205r717059_rule | High |
Description |
---|
The DoD standard for authentication is DoD-approved PKI certificates. Authentication based on user ID and password may be used only when it is not possible to employ a PKI certificate. In such cases, passwords need to be protected at all times, and encryption is the standard method for protecting passwords during transmission. VMware Postgres is configured out of the box to require TLS connections with remote clients. As an embedded database and available only on localhost for standalone VCSAs, TLS connections are used only in high-availability deployments for connections between a primary and a standby. This configuration must be verified and maintained. Satisfies: SRG-APP-000172-DB-000075, SRG-APP-000442-DB-000379 |
STIG | Date |
---|---|
VMware vSphere 6.7 PostgreSQL Security Technical Implementation Guide | 2021-04-15 |
Check Text ( C-42438r678986_chk ) |
---|
At the command prompt, execute the following command: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SHOW ssl;"|sed -n 3p|sed -e 's/^[ ]*//' Expected result: on If the output does not match the expected result, this is a finding. |
Fix Text (F-42397r678987_fix) |
---|
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET ssl TO 'on';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();" |