Logo
Main site Submit a request Sign in
  1. Help Central | G5 Cyber Security
  2. Security Hardening
  3. DISA STIG PostgreSQL 9.x on RHEL OS v2r2

DISA STIG PostgreSQL 9.x on RHEL OS v2r2

Follow New articles New articles and comments
  • PGS9-00-000400 - The audit information produced by PostgreSQL must be protected from unauthorized modification - log directory
  • PGS9-00-000400 - The audit information produced by PostgreSQL must be protected from unauthorized modification - log files
  • PGS9-00-000400 - The audit information produced by PostgreSQL must be protected from unauthorized modification - log_file_mode
  • PGS9-00-000500 - PostgreSQL must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.
  • PGS9-00-000700 - Privileges to change PostgreSQL software modules must be limited - binary objects
  • PGS9-00-000700 - Privileges to change PostgreSQL software modules must be limited - data
  • PGS9-00-000700 - Privileges to change PostgreSQL software modules must be limited - shared objects
  • PGS9-00-000710 - PostgreSQL must limit privileges to change functions and triggers, and links to software external to PostgreSQL - config
  • PGS9-00-000710 - PostgreSQL must limit privileges to change functions and triggers, and links to software external to PostgreSQL - database
  • PGS9-00-000800 - If passwords are used for authentication, PostgreSQL must transmit only encrypted representations of passwords.
  • PGS9-00-000900 - PostgreSQL must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies - authentication
  • PGS9-00-000900 - PostgreSQL must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies - role privileges
  • PGS9-00-000900 - PostgreSQL must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies - table privileges
  • PGS9-00-001100 - PostgreSQL must associate organization-defined types of security labels having organization-defined security label values with information in transmission.
  • PGS9-00-001400 - PostgreSQL must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).
  • PGS9-00-001700 - PostgreSQL must associate organization-defined types of security labels having organization-defined security label values with information in storage.
  • PGS9-00-002100 - PostgreSQL must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
  • PGS9-00-002200 - PostgreSQL must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects - df+
  • PGS9-00-002200 - PostgreSQL must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects - dn
  • PGS9-00-002200 - PostgreSQL must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects - ds
  • PGS9-00-002200 - PostgreSQL must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects - dt
  • PGS9-00-002200 - PostgreSQL must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects - dv
  • PGS9-00-002300 - The audit information produced by PostgreSQL must be protected from unauthorized deletion - log directory
  • PGS9-00-002300 - The audit information produced by PostgreSQL must be protected from unauthorized deletion - log files
  • PGS9-00-002300 - The audit information produced by PostgreSQL must be protected from unauthorized deletion - log_file_mode
  • PGS9-00-002500 - PostgreSQL must reveal detailed error messages only to the ISSO, ISSM, SA and DBA.
  • PGS9-00-002600 - PostgreSQL must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - Config
  • PGS9-00-002600 - PostgreSQL must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - Data
  • PGS9-00-002600 - PostgreSQL must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - Roles
  • PGS9-00-003000 - PostgreSQL must maintain the confidentiality and integrity of information during reception.
  • 1
  • 2
  • ›
  • »

© Help Central | G5 Cyber Security