CIS PostgreSQL 16 v1.1.0 L1 OS Linux PostgreSQLDB

Audit Details

Name: CIS PostgreSQL 16 v1.1.0 L1 OS Linux PostgreSQLDB

Updated: 10/22/2025

Authority: CIS

Plugin: PostgreSQLDB

Revision: 1.0

Estimated Item Count: 58

File Details

Filename: CIS_PostgreSQL_16_v1.1.0_L1_OS_Linux_PostgreSQLDB.audit

Size: 170 kB

MD5: 3d51414874a17aaf6023e241fb7847ba
SHA256: 720a437ad7c7954a9674aa1a03a199e5f7925810ff73bf987a17e2fa636eec90

Audit Items

DescriptionCategories
1.5 Ensure the Latest Security Patches are Applied

SYSTEM AND SERVICES ACQUISITION

3.1.2 Ensure the log destinations are set correctly

AUDIT AND ACCOUNTABILITY

3.1.3 Ensure the logging collector is enabled

AUDIT AND ACCOUNTABILITY

3.1.4 Ensure the log file destination directory is set correctly

AUDIT AND ACCOUNTABILITY

3.1.5 Ensure the filename pattern for log files is set correctly

AUDIT AND ACCOUNTABILITY

3.1.6 Ensure the log file permissions are set correctly

ACCESS CONTROL, MEDIA PROTECTION

3.1.7 Ensure 'log_truncate_on_rotation' is enabled

AUDIT AND ACCOUNTABILITY

3.1.8 Ensure the maximum log file lifetime is set correctly

AUDIT AND ACCOUNTABILITY

3.1.9 Ensure the maximum log file size is set correctly

AUDIT AND ACCOUNTABILITY

3.1.10 Ensure the correct syslog facility is selected

AUDIT AND ACCOUNTABILITY

3.1.11 Ensure syslog messages are not suppressed

AUDIT AND ACCOUNTABILITY

3.1.12 Ensure syslog messages are not lost due to size

AUDIT AND ACCOUNTABILITY

3.1.13 Ensure the program name for PostgreSQL syslog messages is correct

AUDIT AND ACCOUNTABILITY

3.1.14 Ensure the correct messages are written to the server log

AUDIT AND ACCOUNTABILITY

3.1.15 Ensure the correct SQL statements generating errors are recorded

AUDIT AND ACCOUNTABILITY

3.1.16 Ensure 'debug_print_parse' is disabled

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.1.17 Ensure 'debug_print_rewritten' is disabled

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.1.18 Ensure 'debug_print_plan' is disabled

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.1.19 Ensure 'debug_pretty_print' is enabled

AUDIT AND ACCOUNTABILITY

3.1.20 Ensure 'log_connections' is enabled

AUDIT AND ACCOUNTABILITY

3.1.21 Ensure 'log_disconnections' is enabled

AUDIT AND ACCOUNTABILITY

3.1.22 Ensure 'log_error_verbosity' is set correctly

AUDIT AND ACCOUNTABILITY

3.1.23 Ensure 'log_hostname' is set correctly

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.1.24 Ensure 'log_line_prefix' is set correctly

AUDIT AND ACCOUNTABILITY

3.1.25 Ensure 'log_statement' is set correctly

AUDIT AND ACCOUNTABILITY

3.1.26 Ensure 'log_timezone' is set correctly

AUDIT AND ACCOUNTABILITY

3.2 Ensure the PostgreSQL Audit Extension (pgAudit) is enabled

AUDIT AND ACCOUNTABILITY

4.3 Ensure excessive administrative privileges are revoked

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4.4 Lock Out Accounts if Not Currently in Use

ACCESS CONTROL

4.5 Ensure excessive function privileges are revoked

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4.6 Ensure excessive DML privileges are revoked

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4.7 Ensure Row Level Security (RLS) is configured correctly

ACCESS CONTROL, MEDIA PROTECTION

4.8 Ensure the set_user extension is installed

ACCESS CONTROL

4.9 Make use of predefined roles

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.1 Do Not Specify Passwords in the Command Line

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.2 Ensure PostgreSQL is Bound to an IP Address

PLANNING, SYSTEM AND SERVICES ACQUISITION

5.3 Ensure login via "local" UNIX Domain Socket is configured correctly

IDENTIFICATION AND AUTHENTICATION

5.4 Ensure login via "host" TCP/IP Socket is configured correctly

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.5 Ensure per-account connection limits are used

SYSTEM AND COMMUNICATIONS PROTECTION

5.6 Ensure Password Complexity is configured

IDENTIFICATION AND AUTHENTICATION

6.1 Understanding attack vectors and runtime parameters

CONFIGURATION MANAGEMENT

6.2 Ensure 'backend' runtime parameters are configured correctly

CONFIGURATION MANAGEMENT

6.3 Ensure 'Postmaster' Runtime Parameters are Configured

CONFIGURATION MANAGEMENT

6.4 Ensure 'SIGHUP' Runtime Parameters are Configured

CONFIGURATION MANAGEMENT

6.5 Ensure 'Superuser' Runtime Parameters are Configured

CONFIGURATION MANAGEMENT

6.6 Ensure 'User' Runtime Parameters are Configured

CONFIGURATION MANAGEMENT

6.8 Ensure TLS is enabled and configured correctly

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.9 Ensure the TLSv1.0 and TLSv1.1 Protocols are Disabled

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.10 Ensure Weak SSL/TLS Ciphers Are Disabled

SYSTEM AND COMMUNICATIONS PROTECTION

6.11 Ensure the pgcrypto extension is installed and configured correctly

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION