Ensure ‘Attack Vectors’ Runtime Parameters are Configured Details Understanding the vulnerability of PostgreSQL runtime parameters by the particular delivery method, or attack vector. Rationale: There are as...
Ensure Data Cluster Initialized Successfully Details First time installs of PostgreSQL requires the instantiation of the database cluster. A database cluster is a collection of...
Ensure excessive administrative privileges are revoked Details With respect to PostgreSQL administrative SQL commands, only superusers should have elevated privileges. PostgreSQL regular, or application, users should...
Ensure FIPS 140-2 OpenSSL Cryptography Is Used – fips_enabled Details Install, configure, and use OpenSSL on a platform that has a NIST certified FIPS 140-2 installation of OpenSSL. This...
Ensure FIPS 140-2 OpenSSL Cryptography Is Used – openssl version Details Install, configure, and use OpenSSL on a platform that has a NIST certified FIPS 140-2 installation of OpenSSL. This...
Ensure Installation of Binary Packages Details The PostgreSQL package(s) are installed on the Operating System from valid source. Rationale: Standard Linux distributions, although possessing the...
Ensure Installation of Community Packages Details Adding, and installing, the PostgreSQL community packages to the host’s package repository. Rationale: It’s an unfortunate reality that Linux...
Ensure login via ‘host’ TCP/IP Socket is configured correctly Details A large number of authentication METHODs are available for hosts connecting using TCP/IP sockets, including: trust reject md5 password...
Ensure login via ‘local’ UNIX Domain Socket is configured correctly Details A remote host login, via ssh, is arguably the most secure means of remotely accessing and administering the PostgreSQL...
Ensure packages are obtained from authorized repositories Details When obtaining and installing software packages (typically via yum), it’s imperative that packages are sourced only from valid and...