Skip to content

Microsoft Windows Server Domain Name System (DNS) Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000442-DNS-000067

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must maintain the integrity of information during reception.

    &lt;VulnDiscussion&gt;Information can be unintentionally or maliciously disclosed or modified during preparation for transmission, including, for e...
    Rule Medium Severity
  • SRG-APP-000514-DNS-000075

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must implement NIST FIPS-validated cryptography for provisioning digital signatures, generating cryptographic hashes, and protecting unclassified information requiring confidentiality.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The application mu...
    Rule Medium Severity
  • SRG-APP-000251-DNS-000037

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must be configured to only allow zone information that reflects the environment for which it is authoritative, including IP ranges and IP versions.

    &lt;VulnDiscussion&gt;DNS zone data for which a Windows DNS Server is authoritative should represent the network for which it is responsible. If a ...
    Rule Medium Severity
  • SRG-APP-000451-DNS-000069

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must follow procedures to re-role a secondary name server as the primary name server if the primary name server permanently loses functionality.

    &lt;VulnDiscussion&gt;Failing to an unsecure condition negatively impacts application security and can lead to system compromise. Failure condition...
    Rule Medium Severity
  • SRG-APP-000333-DNS-000104

    <GroupDescription></GroupDescription>
    Group
  • The DNS Name Server software must be configured to refuse queries for its version information.

    &lt;VulnDiscussion&gt;Each newer version of the name server software, especially the BIND software, generally is devoid of vulnerabilities found in...
    Rule Medium Severity
  • SRG-APP-000333-DNS-000107

    <GroupDescription></GroupDescription>
    Group
  • The HINFO, RP, TXT, and LOC RR types must not be used in the zone SOA.

    &lt;VulnDiscussion&gt;Several types of resource records (RRs) in the DNS are meant to convey information to humans and applications about the netwo...
    Rule Medium Severity
  • SRG-APP-000268-DNS-000039

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000001-DNS-000115

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must restrict incoming dynamic update requests to known clients.

    &lt;VulnDiscussion&gt;Limiting the number of concurrent sessions reduces the risk of denial of service (DoS) on any system. A DNS server's functio...
    Rule Medium Severity
  • SRG-APP-000348-DNS-000042

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must be configured to record who added/modified/deleted DNS zone information.

    &lt;VulnDiscussion&gt;Without a means for identifying the individual that produced the information, the information cannot be relied on. Identifyin...
    Rule Medium Severity
  • SRG-APP-000350-DNS-000044

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must notify the DNS administrator in the event of an error validating another DNS server's identity.

    &lt;VulnDiscussion&gt;Failing to act on validation errors may result in the use of invalid, corrupted, or compromised information. The validation o...
    Rule Medium Severity
  • SRG-APP-000089-DNS-000004

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules