STIGQter STIGQter: STIG Summary: VMW vRealize Operations Manager 6.x PostgreSQL Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

The vROps PostgreSQL DB must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.

DISA Rule

SV-98943r1_rule

Vulnerability Number

V-88293

Group Title

SRG-APP-000383-DB-000364

Rule Version

VROM-PG-000405

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

At the command prompt, execute the following commands:

# /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET port TO '5432';"
# /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"

Check Contents

At the command prompt, execute the following command:

# grep '^\s*port\b' /storage/db/vcops/vpostgres/data/postgresql.conf

If the port is set to "5432", this is NOT a finding.

If the port is not set to "5432" and if the ISSO does not have documentation of an approved variance for using a non-standard port, this is a finding.

Vulnerability Number

V-88293

Documentable

False

Rule Version

VROM-PG-000405

Severity Override Guidance

At the command prompt, execute the following command:

# grep '^\s*port\b' /storage/db/vcops/vpostgres/data/postgresql.conf

If the port is set to "5432", this is NOT a finding.

If the port is not set to "5432" and if the ISSO does not have documentation of an approved variance for using a non-standard port, this is a finding.

Check Content Reference

M

Target Key

3445

Comments