PGAdmin 4 Hardening Guide

From: "Gum, Laureen Ann (Laurie) CTR USN NAVIFOR SUFFOLK VA (USA)" <laureen(dot)a(dot)gum(dot)ctr(at)us(dot)navy(dot)mil>
To: "pgadmin-support(at)lists(dot)postgresql(dot)org" <pgadmin-support(at)lists(dot)postgresql(dot)org>
Cc: "Goehring, Christel L CTR (USA)" <christel(dot)l(dot)goehring(dot)ctr(at)us(dot)navy(dot)mil>
Subject: PGAdmin 4 Hardening Guide
Date: 2025-04-04 14:51:06
Message-ID: BN9P111MB2276325A946CA6B65B6EAEE9A5A9A@BN9P111MB2276.NAMP111.PROD.OUTLOOK.COM
Views: Whole Thread | Raw Message | Download mbox | Resend email
Thread:
Lists: pgadmin-support

Good Morning,

I am preparing to conduct a cybersecurity risk assessment for a US Navy
organization that has PGAdmin 4 installed on their network. In preparation
for the cybersecurity assessment, each organization is required to harden
all the applications on their network either using DISA Security Technical
Implementation Guides (STIGs) or vendor best practices. I was curious to see
if you had a recommendation as to what DISA STIG(s) would be applicable to
the PGAdmin 4 application? Thank you very much!!

V/R,

Laureen (Laurie) A. Gum, M.S. CS, CISSP

Booz | Allen | Hamilton

Naval Information Forces (NAVIFOR)

Office: 757-203-3450

Cell: 757-344-6709

Team NIPR: NAVIFOR_CIO2_AA-Validator(at)us(dot)navy(dot)mil

NIPR: <mailto:Laureen(dot)a(dot)gum(dot)ctr(at)navy(dot)mil> Laureen(dot)a(dot)gum(dot)ctr(at)navy(dot)mil

SIPR: <mailto:Laureen(dot)a(dot)gum(dot)ctr(at)navy(dot)smil(dot)mil>
Laureen(dot)a(dot)gum(dot)ctr(at)navy(dot)smil(dot)mil

Alt: <mailto:gum_laureen(at)bah(dot)com> gum_laureen(at)bah(dot)com

Responses

Browse pgadmin-support by date

  From Date Subject
Next Message Ray O'Donnell 2025-04-05 14:20:17 Server list on query tool workspace
Previous Message Akshay Joshi 2025-04-03 13:34:45 pgAdmin 4 v9.2 Released