Rule ID
SV-240342r879756_rule
Version
V1R2
CCIs
Use of nonsecure network functions, ports, protocols, and services exposes the system to avoidable threats.
At the command prompt, execute the following command: # grep '^\s*port\b' /storage/db/pgdata/postgresql.conf If the port is set to "5432", this is NOT a finding. If the port is not set to "5432" and if the ISSO does not have documentation of an approved variance for using a non-standard port, this is a finding.
At the command prompt, execute the following commands: # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "ALTER SYSTEM SET port TO '5432';" # /opt/vmware/vpostgres/current/bin/psql -U postgres -c "SELECT pg_reload_conf();"