Details
Organizations are required to use a central log management system, so, under normal conditions, the audit space allocated to EDB Postgres on its own server will not be an issue. However, space will still be required on the EDB Postgres server for audit records in transit, and, under abnormal conditions, this could fill up. Since a requirement exists to halt processing upon audit failure, a service outage would result.
If support personnel are not notified immediately upon storage volume utilization reaching 75%, they are unable to plan for storage capacity expansion.
The appropriate support staff include, at a minimum, the ISSO and the DBA/SA.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
Solution
Install PEM (or similar tool) and configure a probe to monitor ‘
(The default path for the postgresql data directory is C:Program Filesedbas
Example steps for creating a probe are below, using the thin client (browser) PEM interface. Refer also to the Supplemental Procedures document, supplied with this STIG.
Open the PEM web console in a browser.
– Log in.
– Click on the agent for the machine to be monitored.
– Select ‘Management | Probe Configuration’.
– Select ‘Disk Space’ and set the check interval as you like.
– Select ‘Management | Alerting’.
– Name the definition ‘Audit Log Full’.
– Select Template ‘Disk Consumption Percentage’.
– Set Frequency, Comparison Operator, and Thresholds (1 minute, >, 74/75/76 for example).
– Enter the Location for the audit log.
– Click Notification tab.
– Click Email all alerts.
– Click Add/Change to save, click ‘OK’ to exit dialog box.
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability.This control applies to the following type of system Windows.
References
- 800-53|AU-5(1)
- CAT|II
- CCI|CCI-001855
- Rule-ID|SV-224198r508023_rule
- STIG-ID|EP11-00-008000
- STIG-Legacy|SV-109521
- STIG-Legacy|V-100417
- Vuln-ID|V-224198