Domain Name System (DNS) Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The two files generated by the dnssec-keygen program must be made accessible only to the server administrator account, or deleted, after they have been copied to the key file in the name server.
<VulnDiscussion>To enable zone transfer (requests and responses) through authenticated messages, it is necessary to generate a key for every ...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
All authoritative name servers for a zone must be located on different network segments.
<VulnDiscussion>Most enterprises have an authoritative primary server and a host of authoritative secondary name servers. It is essential tha...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
All authoritative name servers for a zone must have the same version of zone information.
<VulnDiscussion>The only protection approach for content control of DNS zone file is the use of a zone file integrity checker. The effectiven...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
An authoritative name server must be configured to enable DNSSEC Resource Records.
<VulnDiscussion>The specification for a digital signature mechanism in the context of the DNS infrastructure is in IETF's DNSSEC standard. I...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
Digital signature algorithm used for DNSSEC-enabled zones must be FIPS-compatible.
<VulnDiscussion>The choice of digital signature algorithm will be based on recommended algorithms in well-known standards. NIST's Digital Sig...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The DNS Name Server software must run with restricted privileges.
<VulnDiscussion>Failure to provide logical access restrictions associated with changes to application configuration may have significant effe...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
In a split DNS configuration, where separate name servers are used between the external and internal networks, the external name server must be configured to not be reachable from inside resolvers.
<VulnDiscussion>Instead of having the same set of authoritative name servers serve different types of clients, an enterprise could have two d...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
In a split DNS configuration, where separate name servers are used between the external and internal networks, the internal name server must be configured to not be reachable from outside resolvers.
<VulnDiscussion>Instead of having the same set of authoritative name servers serve different types of clients, an enterprise could have two d...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
Primary authoritative name servers must be configured to only receive zone transfer requests from specified secondary name servers.
<VulnDiscussion>Authoritative name servers (especially primary name servers) should be configured with an allow-transfer access control subst...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The DNS implementation must be conformant to the IETF DNS specification.
<VulnDiscussion>Any DNS implementation must be designed to be able to conform to the Internet Engineering Task Force (IETF) specification. Do...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.