Skip to content

Microsoft Windows Server Domain Name System (DNS) Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000516-DNS-000078

    <GroupDescription></GroupDescription>
    Group
  • The validity period for the Resource Record Signatures (RRSIGs) covering a zone's DNSKEY RRSet must be no less than two days and no more than one week.

    &lt;VulnDiscussion&gt;The best way for a zone administrator to minimize the impact of a key compromise is by limiting the validity period of RRSIGs...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000084

    <GroupDescription></GroupDescription>
    Group
  • NSEC3 must be used for all internal DNS zones.

    &lt;VulnDiscussion&gt;NSEC records list the resource record types for the name, as well as the name of the next resource record. This information r...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000085

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server's zone files must have NS records that point to active name servers authoritative for the domain specified in that record.

    &lt;VulnDiscussion&gt;Poorly constructed NS records pose a security risk because they create conditions under which an adversary might be able to p...
    Rule High Severity
  • SRG-APP-000516-DNS-000087

    <GroupDescription></GroupDescription>
    Group
  • All authoritative name servers for a zone must be located on different network segments.

    &lt;VulnDiscussion&gt;Most enterprises have an authoritative primary server and a host of authoritative secondary name servers. It is essential tha...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000088

    <GroupDescription></GroupDescription>
    Group
  • All authoritative name servers for a zone must have the same version of zone information.

    &lt;VulnDiscussion&gt;The only protection approach for content control of a DNS zone file is the use of a zone file integrity checker. The effectiv...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000089

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must be configured to enable DNSSEC Resource Records (RRs).

    &lt;VulnDiscussion&gt;The specification for a digital signature mechanism in the context of the DNS infrastructure is in the Internet Engineering T...
    Rule High Severity
  • SRG-APP-000516-DNS-000090

    <GroupDescription></GroupDescription>
    Group
  • The digital signature algorithm used for DNSSEC-enabled zones must be FIPS-compatible.

    &lt;VulnDiscussion&gt;The choice of digital signature algorithm will be based on recommended algorithms in well-known standards. NIST's Digital Sig...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000091

    <GroupDescription></GroupDescription>
    Group
  • For zones split between the external and internal sides of a network, the resource records (RRs) for the external hosts must be separate from the RRs for the internal hosts.

    &lt;VulnDiscussion&gt;Authoritative name servers for an enterprise may be configured to receive requests from both external and internal clients. ...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000092

    <GroupDescription></GroupDescription>
    Group
  • In a split DNS configuration between the external and internal networks, the external name server must be configured to not be reachable from inside resolvers.

    &lt;VulnDiscussion&gt;Instead of having the same set of authoritative name servers serve different types of clients, an enterprise could have two d...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000095

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000215-DNS-000026

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules