SV-233602r617333_rule
V-233602
SRG-APP-000176-DB-000068
CD12-00-010200
CAT I
10
Note: The following instructions use the PGDATA and PGVER environment variables. See supplementary content APPENDIX-F for instructions on configuring PGDATA and APPENDIX-H for PGVER.
Store all PostgreSQL PKI private keys in a FIPS 140-2-validated cryptographic module.
Ensure access to PostgreSQL PKI private keys is restricted to only authenticated and authorized users.
PostgreSQL private key(s) can be stored in $PGDATA directory, which is only accessible by the database owner (usually postgres, DBA) user. Do not allow access to this system account to unauthorized users.
To put the keys in a different directory, as the database administrator (shown here as "postgres"), set the following settings to a protected directory:
$ sudo su - postgres
$ vi ${PGDATA?}/postgresql.conf
ssl_ca_file = "/some/protected/directory/root.crt"
ssl_crl_file = "/some/protected/directory/root.crl"
ssl_cert_file = "/some/protected/directory/server.crt"
ssl_key_file = "/some/protected/directory/server.key"
Now, as the system administrator, restart the server with the new configuration:
# SYSTEMD SERVER ONLY
$ sudo systemctl restart postgresql-${PGVER?}
For more information on configuring PostgreSQL to use SSL, see supplementary content APPENDIX-G.
First, as the database administrator (shown here as "postgres"), verify the following settings:
$ sudo su - postgres
$ psql -c "select name, case when setting = '' then '<undefined>' when substring(setting, 1, 1) = '/' then setting else (select setting from pg_settings where name = 'data_directory') || '/' || setting end as setting from pg_settings where name in ('ssl_ca_file', 'ssl_cert_file', 'ssl_crl_file', 'ssl_key_file');"
If the directory in which these files are stored is not protected, this is a finding.
V-233602
False
CD12-00-010200
First, as the database administrator (shown here as "postgres"), verify the following settings:
$ sudo su - postgres
$ psql -c "select name, case when setting = '' then '<undefined>' when substring(setting, 1, 1) = '/' then setting else (select setting from pg_settings where name = 'data_directory') || '/' || setting end as setting from pg_settings where name in ('ssl_ca_file', 'ssl_cert_file', 'ssl_crl_file', 'ssl_key_file');"
If the directory in which these files are stored is not protected, this is a finding.
M
5254