Details
The DoD standard for authentication is DoD-approved PKI certificates. PKI certificate-based authentication is performed by requiring the certificate holder to cryptographically prove possession of the corresponding private key.
If the private key is stolen, an attacker can use the private key(s) to impersonate the certificate holder. In cases where the DBMS-stored private keys are used to authenticate the DBMS to the system’s clients, loss of the corresponding private keys would allow an attacker to successfully perform undetected man-in-the-middle attacks against the DBMS system and its clients.
All access to the private key(s) of the DBMS must be restricted to authorized and authenticated users.
Solution
At the command prompt, execute the following commands:
# chmod 600 /storage/db/vpostgres_ssl/server.key
# chown vpostgres:users /storage/db/vpostgres_ssl/server.key
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Identification and Authentication.This control applies to the following type of system Unix.
References
- 800-53|IA-5(2)(b)
- CAT|I
- CCI|CCI-000186
- CSCv6|3.1
- Rule-ID|SV-239206r717057_rule
- STIG-ID|VCPG-67-000014
- Vuln-ID|V-239206