Search Postgresql Archives

Re: Baseline configurations

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Yes, a general document shouldn't be applied blindly to a specific
site. It can't address the highest security or lowest security
situation, but instead aim for a general middle applicable to the
majority of situations. The local admin has to review each
recommendation and decide whether it's (A) applicable, (B) worth the
effort, (C) should be implemented differently, or (D) superceded by
somebody else's better recommendation. So we have two documents, the
external well-known baseline, and a local document listing how we
apply each recommendation or why we ignore it or what additional
requirements we have. But the baseline document is still useful as an
authoritative reference.

I'll look through your general database document and see if it has
anything relevant.

On Thu, Aug 30, 2012 at 1:33 PM, salah jubeh <s_jubeh@xxxxxxxxx> wrote:
> Hello,
>
> I think database security is quite complex issue depends on the institution
> requirements. I have worked with elections and voting and we had an extreme
> polices for security not only for authorization, authentication, and
> password policies. We was obligated to use database auditing to record each
> change (insert, update) on the data and the delete sql command was disabled
> for all tables. Other institution has less security requirements. A baseline
> for security fluctuate too much based on needs. In general, I find the
> following document a very a good guide to give a base line for securing the
> data, because it handles the issue also from management point view
>
> http://www.databasesecurity.com/dbsec/database-stig-v7r1.pdf
>
>
> Regards
>
> ________________________________
> From: Mike Orr <sluggoster@xxxxxxxxx>
> To: pgsql-general@xxxxxxxxxxxxxx
> Sent: Thursday, August 30, 2012 9:18 PM
> Subject:  Baseline configurations
>
> Does PostgreSQL have any baseline security configuration documents?
> (Aka "hardened" configuration "benchmark" checklist.) My organization
> is asking for official or vendor-supported baseline configurations for
> all our software. I looked through the PG manual, the security page on
> the website, and in Google and found some discussions about
> customizing role permissions and SSL connections, but nothing that
> covered the entirety of the software like this one for MySQL:
>
> http://benchmarks.cisecurity.org/en-us/?route=downloads.show.single.mysql.102
> (Center for Internet Security). I can't link directly to the document
> because it's behind a download form,  but the TOC outline covers: OS
> level configuration, file system permissions, logging, general
> (default test databases, accounts), database/table permissions,
> configuration options, backup/recovery. Each recommendation specifies
> whether it's scoreable (verifiable by an audit program), and its
> tradeoffs (i.e., whether it might be too burdensome or a bad idea in
> various situations).
>
> If I can't find such a checklist for PostgreSQL I can write my own,
> but it would be more authoritative if it were an official PostgreSQL
> document or supported by a vendor or organization.
>
> Thanks in advance. I've been a happy PostgreSQL user for two or three years
> now.
>
> --
> Mike Orr <sluggoster@xxxxxxxxx>
>
>
> --
> Sent via pgsql-general mailing list (pgsql-general@xxxxxxxxxxxxxx)
> To make changes to your subscription:
> http://www.postgresql.org/mailpref/pgsql-general
>
>



-- 
Mike Orr <sluggoster@xxxxxxxxx>


-- 
Sent via pgsql-general mailing list (pgsql-general@xxxxxxxxxxxxxx)
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgsql-general


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Postgresql Jobs]     [Postgresql Admin]     [Postgresql Performance]     [Linux Clusters]     [PHP Home]     [PHP on Windows]     [Kernel Newbies]     [PHP Classes]     [PHP Books]     [PHP Databases]     [Postgresql & PHP]     [Yosemite]
  Powered by Linux