Check: EPAS-00-000700
EnterpriseDB Postgres Advanced Server (EPAS) STIG:
EPAS-00-000700
(in version v1 r1)
Title
The EDB Postgres Advanced Server must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals. (Cat I impact)
Discussion
Enterprise environments make account management for applications and databases challenging and complex. A manual process for account management functions adds the risk of a potential oversight or other error. Managing accounts for the same person in multiple places is inefficient and prone to problems with consistency and synchronization. A comprehensive application account management process that includes automation helps to ensure that accounts designated as requiring attention are consistently and promptly addressed. Examples include, but are not limited to, using automation to take action on multiple accounts designated as inactive, suspended, or terminated, or by disabling accounts located in noncentralized account stores, such as multiple servers. Account management functions can also include: assignment of group or role membership; identifying account type; specifying user access authorizations (i.e., privileges); account removal, update, or termination; and administrative alerts. The use of automated mechanisms can include, for example: using email or text messaging to notify account managers when users are terminated or transferred; using the information system to monitor account usage; and using automated telephone notification to report atypical system account usage. The DBMS must be configured to automatically use organization-level account management functions, and these functions must immediately enforce the organization's current account policy. Automation may comprise differing technologies that when placed together contain an overall mechanism supporting an organization's automated account management requirements.
Check Content
Verify that pg_hba.conf is not using: "trust", "md5", or "password" as allowable access methods. > cat <path-to-PGDATA-directory>/pg_hba.conf | egrep -I "trust|md5|password"| grep -v "^\#" NOTE: A command line text editor such as VIM or EMACS can also be used to search for "MD5". The default path for PGDATA is /var/lib/edb/as<version>/data, but this will vary according to local circumstances. If any output is produced, verify the users are documented as being authorized to use one of these access methods. If the users are not authorized to use these access methods, this is a finding.
Fix Text
Identify any user that is using "trust", "md5", or "password" as allowable access methods. > cat <path-to-PGDATA-directory>/pg_hba.conf | egrep -I "trust|md5|password"| grep -v "^\#" NOTE: A command line text editor such as VIM or EMACS can also be used such as VIM or EMACS to search for "MD5". The default path for PGDATA is /var/lib/edb/as<version>/data, but this will vary according to local circumstances. Document any rows that have "trust", "md5", or "password" specified for the "METHOD" column and obtain appropriate approval for each user specified in the "USER" column (i.e., all DBMS managed accounts). For any users that are not documented and approved as DBMS managed accounts, change the "METHOD" column to one of the externally managed (not "trust", "md5", or "password") options defined here: https://www.postgresql.org/docs/current/auth-methods.html Use a command line text editor such as VIM or EMACS to make changes. Example: > vim <path-to-PGDATA-directory>/pg_hba.conf
Additional Identifiers
Rule ID: SV-259211r938686_rule
Vulnerability ID: V-259211
Group Title: SRG-APP-000023-DB-000001
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000015 |
The organization employs automated mechanisms to support the information system account management functions. |
Controls
Number | Title |
---|---|
AC-2 (1) |
Automated System Account Management |