Skip to content

Microsoft Windows Server Domain Name System (DNS) Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000422-DNS-000055

    Group
  • WINS lookups must be disabled on the Windows DNS Server.

    The major threat associated with DNS forged responses or failures is the integrity of the DNS data returned in the response. The principle of DNSSEC is to mitigate this threat by providing data ori...
    Rule Medium Severity
  • SRG-APP-000422-DNS-000055

    Group
  • SRG-APP-000214-DNS-000025

    Group
  • The Windows DNS Server must be configured with the Delegation Signer (DS) Resource Records (RR) carrying the signature for the RR that contains the public key of the child zone.

    If name server replies are invalid or cannot be validated, many networking functions and communication would be adversely affected. With DNS, the presence of DS records associated with child zones ...
    Rule Medium Severity
  • SRG-APP-000215-DNS-000003

    Group
  • SRG-APP-000215-DNS-000003

    Group
  • The Name Resolution Policy Table (NRPT) must be configured in Group Policy to enforce clients to request DNSSEC validation for a domain.

    The NRPT is used to require DNSSEC validation. The NRPT can be configured in local Group Policy for a single computer or domain Group Policy for some or all computers in the domain.
    Rule Medium Severity
  • SRG-APP-000215-DNS-000026

    Group
  • The Windows DNS Server must be configured to validate an authentication chain of parent and child domains via response data.

    If name server replies are invalid or cannot be validated, many networking functions and communication would be adversely affected. With DNS, the presence of Delegation Signer (DS) records associat...
    Rule Medium Severity
  • SRG-APP-000215-DNS-000026

    Group
  • Trust anchors must be exported from authoritative Windows DNS Servers and distributed to validating Windows DNS Servers.

    If name server replies are invalid or cannot be validated, many networking functions and communication would be adversely affected. With DNS, the presence of Delegation Signer (DS) records associat...
    Rule Medium Severity
  • SRG-APP-000423-DNS-000056

    Group
  • SRG-APP-000424-DNS-000057

    Group
  • The Windows DNS secondary server must request data integrity verification from the primary server when requesting name/address resolution.

    If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercep...
    Rule Medium Severity
  • SRG-APP-000425-DNS-000058

    Group
  • SRG-APP-000426-DNS-000059

    Group
  • SRG-APP-000219-DNS-000028

    Group
  • The Windows DNS Server must protect the authenticity of zone transfers via transaction signing.

    Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. This applies to server-to-server (zone transfer) transactions and is provide...
    Rule Medium Severity
  • SRG-APP-000219-DNS-000029

    Group
  • The Windows DNS Server must protect the authenticity of dynamic updates via transaction signing.

    DNS is a fundamental network service that is prone to various attacks, such as cache poisoning and man-in-the middle attacks. If communication sessions are not provided appropriate validity protect...
    Rule High Severity
  • SRG-APP-000219-DNS-000030

    Group
  • The Windows DNS Server must protect the authenticity of query responses via DNSSEC.

    The underlying feature in the major threat associated with DNS query/response (i.e., forged response or response failure) is the integrity of DNS data returned in the response. An integral part of ...
    Rule Medium Severity
  • SRG-APP-000427-DNS-000060

    Group
  • The Windows DNS Server must protect the integrity of transmitted information.

    Without protection of the transmitted information, confidentiality and integrity may be compromised because unprotected communications can be intercepted and either read or altered. Communication ...
    Rule High Severity
  • SRG-APP-000441-DNS-000066

    Group
  • SRG-APP-000231-DNS-000033

    Group
  • The Windows DNS Server must protect secret/private cryptographic keys while at rest.

    Information at rest refers to the state of information when it is located on a secondary storage device within an organizational information system. Mobile devices, laptops, desktops, and storage d...
    Rule Medium Severity
  • SRG-APP-000428-DNS-000061

    Group
  • The Windows DNS Server must only contain zone records that have been validated annually.

    If zone information has not been validated in more than a year, there is no assurance that it is still valid. If invalid records are in a zone, an adversary could potentially use their existence fo...
    Rule Medium Severity
  • SRG-APP-000246-DNS-000035

    Group
  • SRG-APP-000247-DNS-000036

    Group
  • The Windows DNS Server must use DNS Notify to prevent denial of service (DoS) through increase in workload.

    In the case of application DoS attacks, care must be taken when designing the application to ensure it makes the best use of system resources. SQL queries have the potential to consume large amount...
    Rule Medium Severity
  • SRG-APP-000439-DNS-000063

    Group
  • SRG-APP-000442-DNS-000067

    Group
  • The Windows DNS Server must maintain the integrity of information during reception.

    Information can be unintentionally or maliciously disclosed or modified during preparation for transmission, including, for example, during aggregation, at protocol transformation points, and durin...
    Rule Medium Severity
  • SRG-APP-000514-DNS-000075

    Group
  • SRG-APP-000251-DNS-000037

    Group
  • The Windows DNS Server must be configured to only allow zone information that reflects the environment for which it is authoritative, including IP ranges and IP versions.

    DNS zone data for which a Windows DNS Server is authoritative should represent the network for which it is responsible. If a Windows DNS Server hosts zone records for other networks or environments...
    Rule Medium Severity
  • SRG-APP-000451-DNS-000069

    Group
  • SRG-APP-000333-DNS-000104

    Group
  • SRG-APP-000333-DNS-000107

    Group
  • The HINFO, RP, TXT, and LOC RR types must not be used in the zone SOA.

    Several types of resource records (RRs) in the DNS are meant to convey information to humans and applications about the network, hosts, or services. These RRs include the Responsible Person (RP) re...
    Rule Medium Severity
  • SRG-APP-000268-DNS-000039

    Group
  • The Windows DNS Server must, when a component failure is detected, activate a notification to the system administrator.

    Predictable failure prevention requires organizational planning to address system failure issues. If components key to maintaining systems security fail to function, the system could continue opera...
    Rule Medium Severity
  • SRG-APP-000473-DNS-000072

    Group
  • The Windows DNS Server must verify the correct operation of security functions upon startup and/or restart, upon command by a user with privileged access, and/or every 30 days.

    Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing the system security policy and supporting the isolation of code and data ...
    Rule Medium Severity
  • SRG-APP-000473-DNS-000072

    Group
  • SRG-APP-000474-DNS-000073

    Group
  • SRG-APP-000275-DNS-000040

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules