Microsoft Windows Server Domain Name System (DNS) Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000422-DNS-000055
Group -
WINS lookups must be disabled on the Windows DNS Server.
The major threat associated with DNS forged responses or failures is the integrity of the DNS data returned in the response. The principle of DNSSEC is to mitigate this threat by providing data ori...Rule Medium Severity -
SRG-APP-000422-DNS-000055
Group -
SRG-APP-000214-DNS-000025
Group -
The Windows DNS Server must be configured with the Delegation Signer (DS) Resource Records (RR) carrying the signature for the RR that contains the public key of the child zone.
If name server replies are invalid or cannot be validated, many networking functions and communication would be adversely affected. With DNS, the presence of DS records associated with child zones ...Rule Medium Severity -
SRG-APP-000215-DNS-000003
Group -
SRG-APP-000215-DNS-000003
Group -
The Name Resolution Policy Table (NRPT) must be configured in Group Policy to enforce clients to request DNSSEC validation for a domain.
The NRPT is used to require DNSSEC validation. The NRPT can be configured in local Group Policy for a single computer or domain Group Policy for some or all computers in the domain.Rule Medium Severity -
SRG-APP-000215-DNS-000026
Group -
The Windows DNS Server must be configured to validate an authentication chain of parent and child domains via response data.
If name server replies are invalid or cannot be validated, many networking functions and communication would be adversely affected. With DNS, the presence of Delegation Signer (DS) records associat...Rule Medium Severity -
SRG-APP-000215-DNS-000026
Group -
Trust anchors must be exported from authoritative Windows DNS Servers and distributed to validating Windows DNS Servers.
If name server replies are invalid or cannot be validated, many networking functions and communication would be adversely affected. With DNS, the presence of Delegation Signer (DS) records associat...Rule Medium Severity -
SRG-APP-000423-DNS-000056
Group -
SRG-APP-000424-DNS-000057
Group -
The Windows DNS secondary server must request data integrity verification from the primary server when requesting name/address resolution.
If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercep...Rule Medium Severity -
SRG-APP-000425-DNS-000058
Group -
SRG-APP-000426-DNS-000059
Group -
SRG-APP-000219-DNS-000028
Group -
The Windows DNS Server must protect the authenticity of zone transfers via transaction signing.
Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. This applies to server-to-server (zone transfer) transactions and is provide...Rule Medium Severity -
SRG-APP-000219-DNS-000029
Group -
The Windows DNS Server must protect the authenticity of dynamic updates via transaction signing.
DNS is a fundamental network service that is prone to various attacks, such as cache poisoning and man-in-the middle attacks. If communication sessions are not provided appropriate validity protect...Rule High Severity -
SRG-APP-000219-DNS-000030
Group -
The Windows DNS Server must protect the authenticity of query responses via DNSSEC.
The underlying feature in the major threat associated with DNS query/response (i.e., forged response or response failure) is the integrity of DNS data returned in the response. An integral part of ...Rule Medium Severity -
SRG-APP-000427-DNS-000060
Group -
The Windows DNS Server must protect the integrity of transmitted information.
Without protection of the transmitted information, confidentiality and integrity may be compromised because unprotected communications can be intercepted and either read or altered. Communication ...Rule High Severity -
SRG-APP-000441-DNS-000066
Group -
SRG-APP-000231-DNS-000033
Group -
The Windows DNS Server must protect secret/private cryptographic keys while at rest.
Information at rest refers to the state of information when it is located on a secondary storage device within an organizational information system. Mobile devices, laptops, desktops, and storage d...Rule Medium Severity -
SRG-APP-000428-DNS-000061
Group -
The Windows DNS Server must only contain zone records that have been validated annually.
If zone information has not been validated in more than a year, there is no assurance that it is still valid. If invalid records are in a zone, an adversary could potentially use their existence fo...Rule Medium Severity -
SRG-APP-000246-DNS-000035
Group -
SRG-APP-000247-DNS-000036
Group -
The Windows DNS Server must use DNS Notify to prevent denial of service (DoS) through increase in workload.
In the case of application DoS attacks, care must be taken when designing the application to ensure it makes the best use of system resources. SQL queries have the potential to consume large amount...Rule Medium Severity -
SRG-APP-000439-DNS-000063
Group -
SRG-APP-000442-DNS-000067
Group -
The Windows DNS Server must maintain the integrity of information during reception.
Information can be unintentionally or maliciously disclosed or modified during preparation for transmission, including, for example, during aggregation, at protocol transformation points, and durin...Rule Medium Severity -
SRG-APP-000514-DNS-000075
Group -
SRG-APP-000251-DNS-000037
Group -
The Windows DNS Server must be configured to only allow zone information that reflects the environment for which it is authoritative, including IP ranges and IP versions.
DNS zone data for which a Windows DNS Server is authoritative should represent the network for which it is responsible. If a Windows DNS Server hosts zone records for other networks or environments...Rule Medium Severity -
SRG-APP-000451-DNS-000069
Group -
SRG-APP-000333-DNS-000104
Group -
SRG-APP-000333-DNS-000107
Group -
The HINFO, RP, TXT, and LOC RR types must not be used in the zone SOA.
Several types of resource records (RRs) in the DNS are meant to convey information to humans and applications about the network, hosts, or services. These RRs include the Responsible Person (RP) re...Rule Medium Severity -
SRG-APP-000268-DNS-000039
Group -
The Windows DNS Server must, when a component failure is detected, activate a notification to the system administrator.
Predictable failure prevention requires organizational planning to address system failure issues. If components key to maintaining systems security fail to function, the system could continue opera...Rule Medium Severity -
SRG-APP-000473-DNS-000072
Group -
The Windows DNS Server must verify the correct operation of security functions upon startup and/or restart, upon command by a user with privileged access, and/or every 30 days.
Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing the system security policy and supporting the isolation of code and data ...Rule Medium Severity -
SRG-APP-000473-DNS-000072
Group -
SRG-APP-000474-DNS-000073
Group -
SRG-APP-000275-DNS-000040
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.