STIGQter STIGQter: STIG Summary: EDB Postgres Advanced Server v11 on Windows Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

The EDB Postgres Advanced Server must initiate support of session auditing upon startup.

DISA Rule

SV-224138r508023_rule

Vulnerability Number

V-224138

Group Title

SRG-APP-000092-DB-000208

Rule Version

EP11-00-001400

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

If EDB Auditing is not enabled, execute the following SQL as enterprisedb:

ALTER SYSTEM SET edb_audit = csv;
SELECT pg_reload_conf();

or

ALTER SYSTEM SET edb_audit = xml;
SELECT pg_reload_conf();

If the edb_audit_statement parameter values is not set to "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, execute the following SQL as enterprisedb:

ALTER SYSTEM SET edb_audit_statement = 'all';
SELECT pg_reload_conf();

or

Update the system documentation to note the organizationally approved setting and corresponding justification of the setting for this requirement.

Check Contents

Execute the following SQL as enterprisedb to ensure auditing is enabled:

SHOW edb_audit;

If the result is not "csv" or "xml", this is a finding.

Execute the following SQL as enterprisedb to check which events are configured to be audited:

SHOW edb_audit_statement;

If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.

Vulnerability Number

V-224138

Documentable

False

Rule Version

EP11-00-001400

Severity Override Guidance

Execute the following SQL as enterprisedb to ensure auditing is enabled:

SHOW edb_audit;

If the result is not "csv" or "xml", this is a finding.

Execute the following SQL as enterprisedb to check which events are configured to be audited:

SHOW edb_audit_statement;

If the result is not "all" or if the current setting for this requirement has not been noted and approved by the organization in the system documentation, this is a finding.

Check Content Reference

M

Target Key

4107

Comments