![]() Solution Alter the configured repositories so they only include valid and authorized sources of packages. NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance. Care must be taken to ensure that only valid and authorized packages are downloaded and installed into such local repositories. Many organizations choose to implement a local yum repository within their organization. However, using invalid or unauthorized sources for packages can lead to implementing untested, defective, or malicious software. Rationale: Being open source, PostgreSQL packages are widely available across the internet through RPM aggregators and providers. For PostgreSQL, a short list of valid repositories would include CentOS (and the official PostgreSQL website (). Information When obtaining and installing software packages (typically via yum), it's imperative that packages are sourced only from valid and authorized repositories. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |