Skip to content

Microsoft Windows Server Domain Name System (DNS) Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The Windows DNS Server authoritative for local zones must only point root hints to the DNS servers that host the internal root domain.

    <VulnDiscussion>All caching name servers must be authoritative for the root zone because, without this starting point, they would have no kno...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000113

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Servers zone files must not include resource records that resolve to a fully qualified domain name residing in another zone.

    &lt;VulnDiscussion&gt;If a name server could claim authority for a resource record in a domain for which it was not authoritative, this would pose ...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000114

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server's zone files must not include CNAME records pointing to a zone with lesser security for more than six months.

    &lt;VulnDiscussion&gt;The use of CNAME records for exercises, tests, or zone-spanning (pointing to zones with lesser security) aliases should be te...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000500

    <GroupDescription></GroupDescription>
    Group
  • Nonroutable IPv6 link-local scope addresses must not be configured in any zone.

    &lt;VulnDiscussion&gt;IPv6 link-local scope addresses are not globally routable and must not be configured in any DNS zone. Like RFC1918 addresses,...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000500

    <GroupDescription></GroupDescription>
    Group
  • AAAA addresses must not be configured in a zone for hosts that are not IPv6 aware.

    &lt;VulnDiscussion&gt;DNS is only responsible for resolving a domain name to an IP address. Applications and operating systems are responsible for ...
    Rule Medium Severity
  • SRG-APP-000390-DNS-000048

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must require devices to reauthenticate for each dynamic update request connection attempt.

    &lt;VulnDiscussion&gt;Without reauthenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity....
    Rule Medium Severity
  • SRG-APP-000158-DNS-000015

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must uniquely identify the other DNS server before responding to a server-to-server transaction.

    &lt;VulnDiscussion&gt;Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. This...
    Rule Medium Severity
  • The Windows DNS Server must log the event and notify the system administrator when anomalies in the operation of the signed zone transfers are discovered.

    &lt;VulnDiscussion&gt;Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing t...
    Rule Medium Severity
  • SRG-APP-000275-DNS-000040

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must be configured to notify the information system security officer (ISSO), information system security manager (ISSM), or DNS administrator when functionality of DNSSEC/TSIG has been removed or broken.

    &lt;VulnDiscussion&gt;Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing t...
    Rule Medium Severity
  • SRG-APP-000176-DNS-000076

    <GroupDescription></GroupDescription>
    Group
  • A unique Transaction Signature (TSIG) key must be generated for each pair of communicating hosts.

    &lt;VulnDiscussion&gt;To enable zone transfer (requests and responses) through authenticated messages, it is necessary to generate a key for every ...
    Rule Medium Severity
  • SRG-APP-000185-DNS-000021

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.

    &lt;VulnDiscussion&gt;If unauthorized personnel use maintenance tools, they may accidentally or intentionally damage or compromise the system. The ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules