V-73063
Severity: High
Generated
2019-05-20 15:48:11.984914
Status
PostgreSQL must use NIST FIPS 140-2 validated cryptographic modules for cryptographic operations.
NIST 800-53
STIG # | Description | Result |
---|---|---|
IA-7 | IA-7: Cryptographic Module Authentication | failed |
Guidance
Use of weak or not validated cryptographic algorithms undermines the purposes of utilizing encryption and digital signatures to protect data. Weak algorithms can be easily broken and not validated cryptographic modules may not implement algorithms correctly. Unapproved cryptographic modules or algorithms should not be relied on for authentication, confidentiality or integrity. Weak cryptography could allow an attacker to gain access to and modify data stored in the database as well as the administration settings of the DBMS.
Applications, including DBMSs, utilizing cryptography are required to use
approved NIST FIPS 140-2 validated cryptographic modules that meet the
requirements of applicable federal laws, Executive Orders, directives,
policies, regulations, standards, and guidance.
The security functions validated as part of FIPS 140-2 for cryptographic
modules are described in FIPS 140-2 Annex A.
NSA Type-X (where X=1, 2, 3, 4) products are NSA-certified, hardware-based
encryption modules.
Check
As the system administrator, run the following:
$ openssl version
If "fips" is not included in the openssl version, this is a finding.
Fix
Configure OpenSSL to meet FIPS Compliance using the following documentation in section 9.1:
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1758.pdf
For more information on configuring PostgreSQL to use SSL, see supplementary
content APPENDIX-G.
Test Results
Result | |
---|---|
Command: `openssl version` stdout should include "fips" | failed |
Code
control "V-73063" do
title "PostgreSQL must use NIST FIPS 140-2 validated cryptographic modules for
cryptographic operations."
desc "Use of weak or not validated cryptographic algorithms undermines the
purposes of utilizing encryption and digital signatures to protect data.
Weak algorithms can be easily broken and not validated cryptographic
modules may not implement algorithms correctly. Unapproved cryptographic
modules or algorithms should not be relied on for authentication,
confidentiality or integrity. Weak cryptography could allow an attacker
to gain access to and modify data stored in the database as well as the
administration settings of the DBMS.
Applications, including DBMSs, utilizing cryptography are required to use
approved NIST FIPS 140-2 validated cryptographic modules that meet the
requirements of applicable federal laws, Executive Orders, directives,
policies, regulations, standards, and guidance.
The security functions validated as part of FIPS 140-2 for cryptographic
modules are described in FIPS 140-2 Annex A.
NSA Type-X (where X=1, 2, 3, 4) products are NSA-certified, hardware-based
encryption modules."
impact 0.7
tag "severity": "high"
tag "gtitle": "SRG-APP-000179-DB-000114"
tag "gid": "V-73063"
tag "rid": "SV-87715r1_rule"
tag "stig_id": "PGS9-00-012300"
tag "cci": "CCI-000803"
tag "nist": ["IA-7", "Rev_4"]
tag "check": "As the system administrator, run the following:
$ openssl version
If \"fips\" is not included in the openssl version, this is a finding."
tag "fix": "Configure OpenSSL to meet FIPS Compliance using the following
documentation in section 9.1:
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1758.pdf
For more information on configuring PostgreSQL to use SSL, see supplementary
content APPENDIX-G."
only_if do
command('openssl').exist?
end
describe command('openssl version') do
its('stdout') { should include 'fips' }
end
end