DISA STIG VMware vSphere 6.7 PostgreSQL v1r1

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: DISA STIG VMware vSphere 6.7 PostgreSQL v1r1

Updated: 10/31/2023

Authority: DISA STIG

Plugin: Unix

Revision: 1.8

Estimated Item Count: 26

File Details

Filename: DISA_STIG_VMware_vSphere_6.7_PostgreSQL_v1r1.audit

Size: 56 kB

MD5: fd2715b0d54a06f15288e3f15aa392b4
SHA256: 53e3b4d69cc00eda9145381ac68de21e8c5eac95d702017286b7c2729b1b3543

Audit Items

DescriptionCategories
DISA_STIG_VMware_vSphere_6.7_PostgreSQL_v1r1.audit from DISA VMware vSphere 6.7 PostgreSQL v1r1 STIG
VCPG-67-000001 - VMware Postgres must limit the number of connections.
VCPG-67-000002 - VMware Postgres log files must contain required fields.
VCPG-67-000003 - VMware Postgres configuration files must not be accessible by unauthorized users.
VCPG-67-000004 - VMware Postgres must be configured to overwrite older logs when necessary.
VCPG-67-000005 - VMware Postgres database must protect log files from unauthorized access and modification.
VCPG-67-000008 - All VCDB tables must be owned by the 'vc' user account - vc user account.
VCPG-67-000009 - VMware Postgres must limit modify privileges to authorized accounts.
VCPG-67-000011 - VMware Postgres must be configured to use the correct port.
VCPG-67-000012 - VMware Postgres must require authentication on all connections.
VCPG-67-000013 - VMware Postgres must be configured to use TLS.
VCPG-67-000014 - VMware Postgres must enforce authorized access to all PKI private keys.
VCPG-67-000015 - VMware Postgres must use FIPS 140-2 approved TLS ciphers.
VCPG-67-000016 - VMware Postgres must write log entries to disk prior to returning operation success or failure - fsync
VCPG-67-000016 - VMware Postgres must write log entries to disk prior to returning operation success or failure - full_page_writes
VCPG-67-000016 - VMware Postgres must write log entries to disk prior to returning operation success or failure - synchronous_commit
VCPG-67-000017 - VMware Postgres must not allow schema access to unauthorized accounts.
VCPG-67-000018 - Data from the vPostgres database must be protected from unauthorized transfer.
VCPG-67-000019 - VMware Postgres must provide non-privileged users with minimal error information.
VCPG-67-000020 - VMware Postgres must have log collection enabled.
VCPG-67-000021 - VMware Postgres must be configured to log to stderr.
VCPG-67-000022 - Rsyslog must be configured to monitor VMware Postgres logs - first
VCPG-67-000022 - Rsyslog must be configured to monitor VMware Postgres logs - log
VCPG-67-000023 - VMware Postgres must use Coordinated Universal Time (UTC) for log timestamps.
VCPG-67-000024 - VMware Postgres must set client-side character encoding to UTF-8.
VCPG-67-000025 - The vPostgres database security updates and patches must be installed in a timely manner in accordance with site policy.