From: | "Gum, Laureen Ann (Laurie) CTR USN NAVIFOR SUFFOLK VA (USA)" <laureen(dot)a(dot)gum(dot)ctr(at)us(dot)navy(dot)mil> |
---|---|
To: | "pgadmin-support(at)lists(dot)postgresql(dot)org" <pgadmin-support(at)lists(dot)postgresql(dot)org> |
Cc: | "Goehring, Christel L CTR (USA)" <christel(dot)l(dot)goehring(dot)ctr(at)us(dot)navy(dot)mil> |
Subject: | PGAdmin 4 Hardening Guide |
Date: | 2025-04-04 14:51:06 |
Message-ID: | BN9P111MB2276325A946CA6B65B6EAEE9A5A9A@BN9P111MB2276.NAMP111.PROD.OUTLOOK.COM |
Views: | Whole Thread | Raw Message | Download mbox | Resend email |
Thread: | |
Lists: | pgadmin-support |
Good Morning,
I am preparing to conduct a cybersecurity risk assessment for a US Navy
organization that has PGAdmin 4 installed on their network. In preparation
for the cybersecurity assessment, each organization is required to harden
all the applications on their network either using DISA Security Technical
Implementation Guides (STIGs) or vendor best practices. I was curious to see
if you had a recommendation as to what DISA STIG(s) would be applicable to
the PGAdmin 4 application? Thank you very much!!
V/R,
Laureen (Laurie) A. Gum, M.S. CS, CISSP
Booz | Allen | Hamilton
Naval Information Forces (NAVIFOR)
Office: 757-203-3450
Cell: 757-344-6709
Team NIPR: NAVIFOR_CIO2_AA-Validator(at)us(dot)navy(dot)mil
NIPR: <mailto:Laureen(dot)a(dot)gum(dot)ctr(at)navy(dot)mil> Laureen(dot)a(dot)gum(dot)ctr(at)navy(dot)mil
SIPR: <mailto:Laureen(dot)a(dot)gum(dot)ctr(at)navy(dot)smil(dot)mil>
Laureen(dot)a(dot)gum(dot)ctr(at)navy(dot)smil(dot)mil
Alt: <mailto:gum_laureen(at)bah(dot)com> gum_laureen(at)bah(dot)com
From | Date | Subject | |
---|---|---|---|
Next Message | Ray O'Donnell | 2025-04-05 14:20:17 | Server list on query tool workspace |
Previous Message | Akshay Joshi | 2025-04-03 13:34:45 | pgAdmin 4 v9.2 Released |