BIND 9.x Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The BIND 9.x server implementation must not be configured with a channel to send audit records to null.
<VulnDiscussion>DNS software administrators require DNS transaction logs for a wide variety of reasons including troubleshooting, intrusion d...Rule Low Severity -
SRG-APP-000001-DNS-000115
<GroupDescription></GroupDescription>Group -
The BIND 9.x server logging configuration must be configured to generate audit records for all DoD-defined auditable events to a local file by enabling triggers for all events with a severity of info, notice, warning, error, and critical for all DNS components.
<VulnDiscussion>Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events r...Rule Low Severity -
SRG-APP-000350-DNS-000044
<GroupDescription></GroupDescription>Group -
In the event of an error when validating the binding of other DNS servers identity to the BIND 9.x information, when anomalies in the operation of the signed zone transfers are discovered, for the success and failure of start and stop of the name server service or daemon, and for the success and failure of all name server events, a BIND 9.x server implementation must generate a log entry.
<VulnDiscussion>Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is ...Rule Low Severity -
SRG-APP-000095-DNS-000006
<GroupDescription></GroupDescription>Group -
The print-severity variable for the configuration of BIND 9.x server logs must be configured to produce audit records containing information to establish what type of events occurred.
<VulnDiscussion>Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is ...Rule Low Severity -
SRG-APP-000096-DNS-000007
<GroupDescription></GroupDescription>Group -
The print-time variable for the configuration of BIND 9.x server logs must be configured to establish when (date and time) the events occurred.
<VulnDiscussion>Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events relating to a...Rule Low Severity -
SRG-APP-000097-DNS-000008
<GroupDescription></GroupDescription>Group -
The BIND 9.x server implementation must limit the number of concurrent session client connections to the number of allowed dynamic update clients.
<VulnDiscussion>Limiting the number of concurrent sessions reduces the risk of Denial of Service (DoS) to the DNS implementation. Name serv...Rule Medium Severity -
SRG-APP-000142-DNS-000014
<GroupDescription></GroupDescription>Group -
The BIND 9.x server implementation must be configured to use only approved ports and protocols.
<VulnDiscussion>In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....Rule Medium Severity -
The print-category variable for the configuration of BIND 9.x server logs must be configured to record information indicating which process generated the events.
<VulnDiscussion>Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events relating to ...Rule Low Severity -
SRG-APP-000125-DNS-000012
<GroupDescription></GroupDescription>Group -
The BIND 9.x server implementation must be configured with a channel to send audit records to a remote syslog.
<VulnDiscussion>Protection of log data includes assuring log data is not accidentally lost or deleted. Backing up audit records to a differen...Rule Low Severity -
SRG-APP-000125-DNS-000012
<GroupDescription></GroupDescription>Group -
The BIND 9.x server implementation must be configured with a channel to send audit records to a local file.
<VulnDiscussion>DNS software administrators require DNS transaction logs for a wide variety of reasons including troubleshooting, intrusion d...Rule Low Severity -
SRG-APP-000125-DNS-000012
<GroupDescription></GroupDescription>Group -
The BIND 9.x server implementation must maintain at least 3 file versions of the local log file.
<VulnDiscussion>DNS software administrators require DNS transaction logs for a wide variety of reasons including troubleshooting, intrusion d...Rule Low Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.