Domain Name System (DNS) Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000099
<GroupDescription></GroupDescription>Group -
The DNS server implementation must produce audit records that contain information to establish the outcome of the events.
<VulnDiscussion>Without information about the outcome of events, security personnel cannot make an accurate assessment about whether an attac...Rule Medium Severity -
SRG-APP-000100
<GroupDescription></GroupDescription>Group -
The DNS server implementations audit records must be backed up at least every seven days onto a different system or system component than the system or component being audited.
<VulnDiscussion>Protection of log data includes assuring log data is not accidentally lost or deleted. Backing up audit records to a differen...Rule Medium Severity -
SRG-APP-000142
<GroupDescription></GroupDescription>Group -
The DNS server implementation must be configured to prohibit or restrict unapproved ports and protocols.
<VulnDiscussion>In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....Rule Medium Severity -
SRG-APP-000158
<GroupDescription></GroupDescription>Group -
The DNS server implementation must uniquely identify the other DNS server before responding to a server-to-server transaction.
<VulnDiscussion>Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. This...Rule Medium Severity -
SRG-APP-000176
<GroupDescription></GroupDescription>Group -
The DNS server implementation, when using PKI-based authentication, must enforce authorized access to the corresponding private key.
<VulnDiscussion>The cornerstone of the PKI is the private key used to encrypt or digitally sign information. If the private key is stolen, th...Rule Medium Severity -
SRG-APP-000176
<GroupDescription></GroupDescription>Group -
The key file must be owned by the account under which the name server software is run.
<VulnDiscussion>To enable zone transfer (requests and responses) through authenticated messages, it is necessary to generate a key for every ...Rule Medium Severity -
SRG-APP-000176
<GroupDescription></GroupDescription>Group -
Read/Write access to the key file must be restricted to the account that runs the name server software only.
<VulnDiscussion>To enable zone transfer (requests and responses) through authenticated messages, it is necessary to generate a key for every ...Rule Medium Severity -
SRG-APP-000176
<GroupDescription></GroupDescription>Group -
Only the private key corresponding to the ZSK alone must be kept on the name server that does support dynamic updates.
<VulnDiscussion>The private keys in the KSK and ZSK key pairs must be protected from unauthorized access. If possible, the private keys shoul...Rule Medium Severity -
SRG-APP-000176
<GroupDescription></GroupDescription>Group -
Signature generation using the KSK must be done off-line, using the KSK-private stored off-line.
<VulnDiscussion>Security-relevant information is any information within information systems that can potentially impact the operation of secu...Rule Medium Severity -
SRG-APP-000185
<GroupDescription></GroupDescription>Group -
The DNS server implementation must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.
<VulnDiscussion>If maintenance tools are used by unauthorized personnel, they may accidentally or intentionally damage or compromise the syst...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.