Microsoft Windows 2012 Server Domain Name System Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000275-DNS-000040
<GroupDescription></GroupDescription>Group -
The Windows 2012 DNS Server must be configured to notify the ISSO/ISSM/DNS administrator when functionality of DNSSEC/TSIG has been removed or broken.
<VulnDiscussion>Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing t...Rule Medium Severity -
SRG-APP-000001-DNS-000115
<GroupDescription></GroupDescription>Group -
The Windows 2012 DNS Server must restrict incoming dynamic update requests to known clients.
<VulnDiscussion>Limiting the number of concurrent sessions reduces the risk of Denial of Service (DoS) on any system. A DNS server's functio...Rule Medium Severity -
SRG-APP-000348-DNS-000042
<GroupDescription></GroupDescription>Group -
The Windows 2012 DNS Server must be configured to record, and make available to authorized personnel, who added/modified/deleted DNS zone information.
<VulnDiscussion>Without a means for identifying the individual that produced the information, the information cannot be relied upon. Identify...Rule Medium Severity -
SRG-APP-000350-DNS-000044
<GroupDescription></GroupDescription>Group -
The Windows 2012 DNS Server must, in the event of an error validating another DNS servers identity, send notification to the DNS administrator.
<VulnDiscussion>Failing to act on the validation errors may result in the use of invalid, corrupted, or compromised information. The validati...Rule Medium Severity -
SRG-APP-000089-DNS-000004
<GroupDescription></GroupDescription>Group -
The Windows 2012 DNS Server log must be enabled.
<VulnDiscussion>Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events r...Rule Medium Severity -
SRG-APP-000089-DNS-000005
<GroupDescription></GroupDescription>Group -
The Windows 2012 DNS Server logging must be enabled to record events from all DNS server functions.
<VulnDiscussion>DNS server performance can be affected when additional logging is enabled; however, the enhanced DNS logging and diagnostics ...Rule Medium Severity -
SRG-APP-000516-DNS-000500
<GroupDescription></GroupDescription>Group -
The Windows 2012 DNS Server logging criteria must only be configured by the ISSM or individuals appointed by the ISSM.
<VulnDiscussion>Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events r...Rule Medium Severity -
SRG-APP-000125-DNS-000012
<GroupDescription></GroupDescription>Group -
The Windows 2012 DNS Servers audit records must be backed up at least every seven days onto a different system or system component than the system or component being audited.
<VulnDiscussion>Protection of log data includes assuring log data is not accidentally lost or deleted. Backing up audit records to a differen...Rule Medium Severity -
SRG-APP-000214-DNS-000079
<GroupDescription></GroupDescription>Group -
The validity period for the RRSIGs covering the DS RR for a zones delegated children must be no less than two days and no more than one week.
<VulnDiscussion>The best way for a zone administrator to minimize the impact of a key compromise is by limiting the validity period of RRSIGs...Rule Medium Severity -
SRG-APP-000218-DNS-000027
<GroupDescription></GroupDescription>Group -
The Windows DNS name servers for a zone must be geographically dispersed.
<VulnDiscussion>In addition to network-based separation, authoritative name servers should be dispersed geographically as well. In other word...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.