STIGQter STIGQter: STIG Summary: EDB Postgres Advanced Server Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

Default, demonstration and sample databases, database objects, and applications must be removed.

DISA Rule

SV-213591r508024_rule

Vulnerability Number

V-213591

Group Title

SRG-APP-000141-DB-000090

Rule Version

PPS9-00-003700

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Remove any unused sample databases from the DBMS.

To remove a database, execute the follow SQL:

DROP DATABASE <database>;

Check Contents

Review vendor documentation and vendor websites for vendor-provided demonstration or sample databases, database applications, objects, and files.

Review the DBMS to determine if any of the demonstration and sample databases, database applications, or files are installed in the database or are included with the DBMS application.

If any are present in the database or are included with the DBMS application, this is a finding.

Check for the existence of EDB Postgres sample databases: postgres and edb. Execute the following SQL as enterprisedb:

SELECT datname FROM pg_database WHERE datistemplate = false;

If any databases are listed here that are not used by the application, this is a finding.

Vulnerability Number

V-213591

Documentable

False

Rule Version

PPS9-00-003700

Severity Override Guidance

Review vendor documentation and vendor websites for vendor-provided demonstration or sample databases, database applications, objects, and files.

Review the DBMS to determine if any of the demonstration and sample databases, database applications, or files are installed in the database or are included with the DBMS application.

If any are present in the database or are included with the DBMS application, this is a finding.

Check for the existence of EDB Postgres sample databases: postgres and edb. Execute the following SQL as enterprisedb:

SELECT datname FROM pg_database WHERE datistemplate = false;

If any databases are listed here that are not used by the application, this is a finding.

Check Content Reference

M

Target Key

3988

Comments