STIGQter STIGQter: STIG Summary: VMW vRealize Automation 7.x PostgreSQL Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

The vRA PostgreSQL database must be limited to authorized accounts.

DISA Rule

SV-100021r1_rule

Vulnerability Number

V-89371

Group Title

SRG-APP-000148-DB-000103

Rule Version

VRAU-PG-000160

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Navigate to and open /storage/db/pgdata/pg_hba.conf.

Navigate to the user that has a method of "trust".

Change the method to "md5".

A correct, typical line will look like the following:
# TYPE DATABASE USER ADDRESS METHOD
host all all 127.0.0.1/32 md5

Check Contents

At the command prompt, execute the following command to enter the psql prompt:

# cat /storage/db/pgdata/pg_hba.conf

If any rows have "trust" specified for the "METHOD" column, this is a finding.

Vulnerability Number

V-89371

Documentable

False

Rule Version

VRAU-PG-000160

Severity Override Guidance

At the command prompt, execute the following command to enter the psql prompt:

# cat /storage/db/pgdata/pg_hba.conf

If any rows have "trust" specified for the "METHOD" column, this is a finding.

Check Content Reference

M

Target Key

3443

Comments