Skip to content

Microsoft Windows Server Domain Name System (DNS) Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The Windows DNS Server must be configured to notify the information system security officer (ISSO), information system security manager (ISSM), or DNS administrator when functionality of DNSSEC/TSIG has been removed or broken.

    Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing the system security policy and supporting the isolation of code and data ...
    Rule Medium Severity
  • SRG-APP-000176-DNS-000076

    Group
  • A unique Transaction Signature (TSIG) key must be generated for each pair of communicating hosts.

    To enable zone transfer (requests and responses) through authenticated messages, it is necessary to generate a key for every pair of name servers. The key also can be used for securing other transa...
    Rule Medium Severity
  • SRG-APP-000185-DNS-000021

    Group
  • SRG-APP-000226-DNS-000032

    Group
  • In the event of a system failure, the Windows DNS Server must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes.

    Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Failure to a known secure state helps prevent a loss of confidentiality, i...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000105

    Group
  • The DNS Name Server software must run with restricted privileges.

    Failure to provide logical access restrictions associated with changes to application configuration may have significant effects on the overall security of the system. When dealing with access rest...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000112

    Group
  • The private keys corresponding to both the zone signing key (ZSK) and the key signing key (KSK) must not be kept on the DNSSEC-aware primary authoritative name server when the name server does not support dynamic updates.

    The private keys in the KSK and ZSK key pairs must be protected from unauthorized access. If possible, the private keys should be stored offline (with respect to the internet-facing, DNSSEC-aware n...
    Rule Medium Severity
  • SRG-APP-000125-DNS-000012

    Group
  • The Windows DNS Server audit records must be backed up at least every seven days onto a different system or system component than the system or component being audited.

    Protection of log data includes ensuring log data is not accidentally lost or deleted. Backing up audit records to a different system or onto media separate from the system being audited on a defin...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000093

    Group
  • In a split DNS configuration, where separate name servers are used between the external and internal networks, the internal name server must be configured to not be reachable from outside resolvers.

    Instead of having the same set of authoritative name servers serve different types of clients, an enterprise could have two different sets of authoritative name servers. One set, called external ...
    Rule Medium Severity
  • SRG-APP-000247-DNS-000036

    Group
  • Windows DNS response rate limiting (RRL) must be enabled.

    This setting can prevent someone from sending a denial-of-service attack using the DNS servers. For instance, a bot net can send requests to the DNS server using the IP address of a third computer ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules