STIGQter STIGQter: STIG Summary: VMware vSphere 6.7 PostgreSQL Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 09 Mar 2021:

VMware Postgres database must protect log files from unauthorized access and modification.

DISA Rule

SV-239200r717052_rule

Vulnerability Number

V-239200

Group Title

SRG-APP-000118-DB-000059

Rule Version

VCPG-67-000005

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

At the command prompt, enter the following command:

# chmod 600 <file>
# chown vpostgres:users <file>

Note: Replace <file> with the file with incorrect permissions.

At the command prompt, execute the following commands:

# /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET log_file_mode TO '0600';"

# /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"

Check Contents

At the command prompt, enter the following command:

# find /var/log/vmware/vpostgres/* -xdev -type f -a '(' -not -perm 600 -o -not -user vpostgres -o -not -group users ')' -exec ls -ld {} \;

If any files are returned, this is a finding.

Vulnerability Number

V-239200

Documentable

False

Rule Version

VCPG-67-000005

Severity Override Guidance

At the command prompt, enter the following command:

# find /var/log/vmware/vpostgres/* -xdev -type f -a '(' -not -perm 600 -o -not -user vpostgres -o -not -group users ')' -exec ls -ld {} \;

If any files are returned, this is a finding.

Check Content Reference

M

Target Key

5324

Comments