BIND 9.x Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The master servers in a BIND 9.x implementation must notify authorized secondary name servers when zone files are updated.
<VulnDiscussion>It is important to maintain the integrity of a zone file. The serial number of the SOA record is used to indicate to secondar...Rule Low Severity -
SRG-APP-000516-DNS-000088
<GroupDescription></GroupDescription>Group -
The secondary name servers in a BIND 9.x implementation must be configured to initiate zone update notifications to other authoritative zone name servers.
<VulnDiscussion>It is important to maintain the integrity of a zone file. The serial number of the SOA record is used to indicate to secondar...Rule Low Severity -
SRG-APP-000516-DNS-000110
<GroupDescription></GroupDescription>Group -
The BIND 9.X implementation must not utilize a TSIG or DNSSEC key for more than one year.
<VulnDiscussion>Cryptographic keys are the backbone of securing DNS information over the wire, maintaining DNS data integrity, and the provid...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Capacity
Modules