Skip to content

BIND 9.x Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The BIND 9.X implementation must not utilize a TSIG or DNSSEC key for more than one year.

    <VulnDiscussion>Cryptographic keys are the backbone of securing DNS information over the wire, maintaining DNS data integrity, and the provid...
    Rule Medium Severity
  • SRG-APP-000514-DNS-000075

    <GroupDescription></GroupDescription>
    Group
  • A BIND 9.x server must implement NIST FIPS-validated cryptography for provisioning digital signatures and generating cryptographic hashes.

    &lt;VulnDiscussion&gt;The use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The applic...
    Rule High Severity
  • The DNSSEC keys used with the BIND 9.x implementation must be owned by a privileged account.

    &lt;VulnDiscussion&gt;Information at rest refers to the state of information when it is located on a secondary storage device within an organizatio...
    Rule Medium Severity
  • SRG-APP-000231-DNS-000033

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules