V-73071
Severity: High
Generated
2019-05-20 15:48:11.984914
Status
Skipped
The DBMS must be configured on a platform that has a NIST certified FIPS 140-2 installation of OpenSSL.
NIST 800-53
STIG # | Description | Result |
---|---|---|
IA-7 | IA-7: Cryptographic Module Authentication | failed |
Guidance
Postgres uses OpenSSL for the underlying encryption layer. Currently only Red Hat Enterprise Linux is certified as a FIPS 140-2 distribution of OpenSSL. For other operating systems, users must obtain or build their own FIPS 140-2 OpenSSL libraries.
Check
If the deployment incorporates a custom build of the operating system and Postgres guaranteeing the use of FIPS 140-2 compliant OpenSSL, this is not a finding.
If PostgreSQL is not installed on Red Hat Enterprise Linux (RHEL),
this is a finding.
If FIPS encryption is not enabled, this is a finding.
Fix
Install Postgres with FIPS-compliant cryptography enabled on RHEL; or by other means ensure that FIPS 140-2 certified OpenSSL libraries are used by the DBMS.
Test Results
Result | |
---|---|
Operating System Detection | skipped |
Code
control "V-73071" do
title "The DBMS must be configured on a platform that has a NIST certified
FIPS 140-2 installation of OpenSSL."
desc "Postgres uses OpenSSL for the underlying encryption layer. Currently only
Red Hat Enterprise Linux is certified as a FIPS 140-2 distribution of
OpenSSL. For other operating systems, users must obtain or build their
own FIPS 140-2 OpenSSL libraries."
impact 0.7
tag "severity": "high"
tag "gtitle": "SRG-APP-000179-DB-000114"
tag "gid": "V-73071"
tag "rid": "SV-87723r1_rule"
tag "stig_id": "PGS9-00-012800"
tag "cci": "CCI-000803"
tag "nist": ["IA-7", "Rev_4"]
tag "check": "If the deployment incorporates a custom build of the operating
system and Postgres guaranteeing the use of FIPS 140-2 compliant OpenSSL,
this is not a finding.
If PostgreSQL is not installed on Red Hat Enterprise Linux (RHEL),
this is a finding.
If FIPS encryption is not enabled, this is a finding."
# https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Security_Guide/chap-Federal_Standards_and_Regulations.html
# fips=1 kernel option to the kernel command line during system
# installation.
# PRELINKING=no option in the /etc/sysconfig/prelink
# run
# yum install dracut-fips
# For the CPUs with the AES New Instructions (AES-NI) support, install the
# vdracut-fips-aesni package as well:
# in the CM:
# To disable existing prelinking on all system files, use the
# prelink -u -a command.
tag "fix": "Install Postgres with FIPS-compliant cryptography enabled on RHEL;
or by other means ensure that FIPS 140-2 certified OpenSSL libraries are
used by the DBMS."
only_if { false }
end