Item Search

NameAudit NamePluginCategory
3.1.5.16 ntalkCIS IBM AIX 7.1 L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

3.1.5.27 talkCIS IBM AIX 7.1 L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

3.1.9 Ensure the maximum log file size is set correctlyCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLPostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.10 Ensure the correct syslog facility is selectedCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLPostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.17 Ensure 'debug_print_rewritten' is disabledCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLPostgreSQLDB

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.1.18 Ensure 'debug_print_plan' is disabledCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLPostgreSQLDB

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.1.19 Ensure 'debug_pretty_print' is enabledCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLPostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.20 Ensure 'log_connections' is enabledCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLPostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.26 Ensure 'log_timezone' is set correctlyCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLPostgreSQLDB

AUDIT AND ACCOUNTABILITY

4.4 Lock Out Accounts if Not Currently in UseCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLPostgreSQLDB

ACCESS CONTROL

4.6 Ensure excessive DML privileges are revokedCIS PostgreSQL 13 DB v1.2.0PostgreSQLDB

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4.6 Ensure excessive DML privileges are revokedCIS PostgreSQL 14 DB v 1.2.0PostgreSQLDB

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.3 Ensure 'Postmaster' Runtime Parameters are ConfiguredCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLPostgreSQLDB

CONFIGURATION MANAGEMENT

6.6 Ensure 'User' Runtime Parameters are ConfiguredCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLPostgreSQLDB

CONFIGURATION MANAGEMENT

6.7 Ensure FIPS 140-2 OpenSSL Cryptography Is UsedCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.9 Ensure that TLSv1.3, or later, is configuredCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLPostgreSQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.10 Ensure Weak SSL/TLS Ciphers Are DisabledCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLUnix

SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure a replication-only user is created and used for streaming replicationCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLPostgreSQLDB

ACCESS CONTROL

8.1 Ensure PostgreSQL subdirectory locations are outside the data clusterCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLPostgreSQLDB

CONFIGURATION MANAGEMENT

8.2 Create Warning Banner for CDE Users - Check if 'Dtlogin*greeting.labelString' is not set to default string.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

8.2 Ensure the backup and restore tool, 'pgBackRest', is installed and configuredCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLUnix

CONTINGENCY PLANNING

9.9 Check Permissions on User .netrc FilesCIS Solaris 11.2 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

Catalina - Uniquely Identify Users and ProcessesNIST macOS Catalina v1.5.0 - All ProfilesUnix

IDENTIFICATION AND AUTHENTICATION

CD12-00-002900 - PostgreSQL must by default shut down upon audit failure, to include the unavailability of space for more audit log records; or must be configurable to shut down upon audit failure.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

CD12-00-005500 - PostgreSQL must be able to generate audit records when privileges/permissions are retrieved.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

CD12-00-005800 - PostgreSQL must generate audit records for all privileged activities or other system-level access.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

CD12-00-006000 - PostgreSQL must be able to generate audit records when security objects are accessed.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

EP11-00-003000 - The EDB Postgres Advanced Server must protect its audit configuration from unauthorized modification.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

AUDIT AND ACCOUNTABILITY

EP11-00-003800 - Unused database components, EDB Postgres Advanced Server software, and database objects must be removed.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

CONFIGURATION MANAGEMENT

EP11-00-004900 - The EDB Postgres Advanced Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for all cryptographic operations including generation of cryptographic hashes and data protection.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

EP11-00-006100 - Access to database files must be limited to relevant processes and to authorized, administrative users.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EP11-00-008500 - The EDB Postgres Advanced Server must enforce access restrictions associated with changes to the configuration of the EDB Postgres Advanced Server or database(s).EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

CONFIGURATION MANAGEMENT

EP11-00-008700 - The EDB Postgres Advanced Server must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

CONFIGURATION MANAGEMENT

EP11-00-009600 - The EDB Postgres Advanced Server must maintain the confidentiality and integrity of information during reception.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

PGS9-00-000700 - Privileges to change PostgreSQL software modules must be limited.DISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

CONFIGURATION MANAGEMENT

PGS9-00-001300 - The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (functions, trigger procedures, links to software external to PostgreSQL, etc.) must be restricted to authorized users - s used to modify database structure and logic modules must be restricted to authorized users.DISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

CONFIGURATION MANAGEMENT

PGS9-00-001700 - PostgreSQL must associate organization-defined types of security labels having organization-defined security label values with information in storage.DISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

ACCESS CONTROL

PGS9-00-002100 - PostgreSQL must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.DISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

AUDIT AND ACCOUNTABILITY

PGS9-00-002500 - PostgreSQL must reveal detailed error messages only to the ISSO, ISSM, SA and DBA.DISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

SYSTEM AND INFORMATION INTEGRITY

PGS9-00-003100 - Database objects (including but not limited to tables, indexes, storage, trigger procedures, functions, links to software external to PostgreSQL, etc.) must be owned by database/DBMS principals authorized for ownership.DISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

CONFIGURATION MANAGEMENT

PGS9-00-008400 - PostgreSQL must prohibit user installation of logic modules (functions, trigger procedures, views, etc.) without explicit privileged status.DISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

CONFIGURATION MANAGEMENT

PGS9-00-008500 - PostgreSQL must separate user functionality (including user interface services) from database management functionality.DISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PGS9-00-009400 - PostgreSQL must associate organization-defined types of security labels having organization-defined security label values with information in process.DISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

ACCESS CONTROL

PGS9-00-010600 - PostgreSQL must invalidate session identifiers upon user logout or other session termination.DISA STIG PostgreSQL 9.x on RHEL DB v2r5PostgreSQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

PGS9-00-010700 - PostgreSQL must protect its audit features from unauthorized access - LogsDISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

AUDIT AND ACCOUNTABILITY

PGS9-00-010700 - PostgreSQL must protect its audit features from unauthorized access - roles.DISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

AUDIT AND ACCOUNTABILITY

PGS9-00-010700 - PostgreSQL must protect its audit features from unauthorized access.DISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

AUDIT AND ACCOUNTABILITY

PGS9-00-011200 - PostgreSQL must protect its audit features from unauthorized removal.DISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

AUDIT AND ACCOUNTABILITY

PGS9-00-012900 - PostgreSQL products must be a version supported by the vendor.DISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

SYSTEM AND SERVICES ACQUISITION

SOL-11.1-070190 - All valid SUID/SGID files must be documented.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT