UCF STIG Viewer Logo

vRA Postgres must be configured to use the correct port.


Overview

Finding ID Version Rule ID IA Controls Severity
V-89461 VRAU-PG-000605 SV-100111r1_rule Medium
Description
Use of nonsecure network functions, ports, protocols, and services exposes the system to avoidable threats.
STIG Date
VMW vRealize Automation 7.x PostgreSQL Security Technical Implementation Guide 2018-10-12

Details

Check Text ( C-89153r1_chk )
At the command prompt, execute the following command:

# grep '^\s*port\b' /storage/db/pgdata/postgresql.conf

If the port is set to "5432", this is NOT a finding.

If the port is not set to "5432" and if the ISSO does not have documentation of an approved variance for using a non-standard port, this is a finding.
Fix Text (F-96203r1_fix)
At the command prompt, execute the following commands:

# /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET port TO '5432';"
# /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"