Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000426-DNS-000059

    Group
  • The Windows DNS secondary server must validate data origin verification authentication on the name/address resolution responses received from primary name servers.

    If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercep...
    Rule Medium Severity
  • SRG-APP-000219-DNS-000028

    Group
  • The Windows 2012 DNS Server must protect the authenticity of zone transfers via transaction signing.

    Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. This applies to server-to-server (zone transfer) transactions and is provide...
    Rule Medium Severity
  • SRG-APP-000219-DNS-000029

    Group
  • The Windows 2012 DNS Server must protect the authenticity of dynamic updates via transaction signing.

    DNS is a fundamental network service that is prone to various attacks, such as cache poisoning and man-in-the middle attacks. If communication sessions are not provided appropriate validity protect...
    Rule High Severity
  • SRG-APP-000219-DNS-000030

    Group
  • The Windows 2012 DNS Server must protect the authenticity of query responses via DNSSEC.

    The underlying feature in the major threat associated with DNS query/response (i.e., forged response or response failure) is the integrity of DNS data returned in the response. An integral part of ...
    Rule Medium Severity
  • SRG-APP-000427-DNS-000060

    Group
  • The Windows 2012 DNS Server must only allow the use of an approved DoD PKI-established certificate authorities for verification of the establishment of protected transactions.

    Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that seek to compromise DoD systems or by organizations with insufficient secur...
    Rule Medium Severity
  • SRG-APP-000231-DNS-000033

    Group
  • The Windows 2012 DNS Server must protect secret/private cryptographic keys while at rest.

    Information at rest refers to the state of information when it is located on a secondary storage device within an organizational information system. Mobile devices, laptops, desktops, and storage d...
    Rule Medium Severity
  • SRG-APP-000428-DNS-000061

    Group
  • The Windows 2012 DNS Server must not contain zone records that have not been validated in over a year.

    If zone information has not been validated in over a year, then there is no assurance that it is still valid. If invalid records are in a zone, then an adversary could potentially use their existe...
    Rule Medium Severity
  • SRG-APP-000246-DNS-000035

    Group
  • The Windows 2012 DNS Server must restrict individuals from using it for launching Denial of Service (DoS) attacks against other information systems.

    Applications and application developers must take the steps needed to ensure users cannot use an authorized application to launch DoS attacks against other systems and networks. For example, applic...
    Rule Medium Severity
  • SRG-APP-000247-DNS-000036

    Group
  • The Windows 2012 DNS Server must use DNS Notify to prevent denial of service through increase in workload.

    In the case of application DoS attacks, care must be taken when designing the application to ensure the application makes the best use of system resources. SQL queries have the potential to consume...
    Rule Medium Severity
  • SRG-APP-000439-DNS-000063

    Group
  • The Windows 2012 DNS Server must protect the integrity of transmitted information.

    Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communications can be intercepted and either read or altered. Communication pa...
    Rule Medium Severity
  • SRG-APP-000441-DNS-000066

    Group
  • The Windows 2012 DNS Server must maintain the integrity of information during preparation for transmission.

    Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, including, for example, during aggregation, at protocol transformation points, an...
    Rule Medium Severity
  • SRG-APP-000442-DNS-000067

    Group
  • The Windows 2012 DNS Server must maintain the integrity of information during reception.

    Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, including, for example, during aggregation, at protocol transformation points, an...
    Rule Medium Severity
  • SRG-APP-000514-DNS-000075

    Group
  • The Windows 2012 DNS Server must implement NIST FIPS-validated cryptography for provisioning digital signatures, generating cryptographic hashes, and protecting unclassified information requiring confidentiality.

    Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The application must implement cryptographic modules adhering to the higher standards ...
    Rule Medium Severity
  • SRG-APP-000251-DNS-000037

    Group
  • The Windows 2012 DNS Server must be configured to only allow zone information that reflects the environment for which it is authoritative, to include IP ranges and IP versions.

    DNS zone data for which a Windows 2012 DNS server is authoritative should represent the network for which it is responsible. If a Windows 2012 DNS server hosts zone records for other networks or en...
    Rule Medium Severity
  • SRG-APP-000451-DNS-000069

    Group
  • The Windows 2012 DNS Server must follow procedures to re-role a secondary name server as the master name server should the master name server permanently lose functionality.

    Failing to an unsecure condition negatively impacts application security and can lead to system compromise. Failure conditions include, for example, loss of communications among critical system com...
    Rule Medium Severity
  • SRG-APP-000333-DNS-000104

    Group
  • The DNS Name Server software must be configured to refuse queries for its version information.

    Each newer version of the name server software, especially the BIND software, generally is devoid of vulnerabilities found in earlier versions because it has design changes incorporated to take car...
    Rule Medium Severity
  • SRG-APP-000333-DNS-000107

    Group
  • The HINFO, RP, TXT and LOC RR types must not be used in the zone SOA.

    There are several types of RRs in the DNS that are meant to convey information to humans and applications about the network, hosts, or services. These RRs include the Responsible Person (RP) record...
    Rule Medium Severity
  • SRG-APP-000268-DNS-000039

    Group
  • The Windows 2012 DNS Server must, when a component failure is detected, activate a notification to the system administrator.

    Predictable failure prevention requires organizational planning to address system failure issues. If components key to maintaining systems security fail to function, the system could continue opera...
    Rule Medium Severity
  • SRG-APP-000473-DNS-000072

    Group
  • The Windows 2012 DNS Server must perform verification of the correct operation of security functions: upon system start-up and/or restart; upon command by a user with privileged access; and/or every 30 days.

    Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing the system security policy and supporting the isolation of code and data ...
    Rule Medium Severity
  • SRG-APP-000474-DNS-000073

    Group
  • The Windows 2012 DNS Server must log the event and notify the system administrator when anomalies in the operation of the signed zone transfers are discovered.

    Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing the system security policy and supporting the isolation of code and data ...
    Rule Medium Severity
  • SRG-APP-000275-DNS-000040

    Group
  • The Windows 2012 DNS Server must be configured to notify the ISSO/ISSM/DNS administrator when functionality of DNSSEC/TSIG has been removed or broken.

    Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing the system security policy and supporting the isolation of code and data ...
    Rule Medium Severity
  • SRG-APP-000001-DNS-000115

    Group
  • The Windows 2012 DNS Server must restrict incoming dynamic update requests to known clients.

    Limiting the number of concurrent sessions reduces the risk of Denial of Service (DoS) on any system. A DNS server's function requires it to be able to handle multiple sessions at a time so limiti...
    Rule Medium Severity
  • SRG-APP-000348-DNS-000042

    Group
  • The Windows 2012 DNS Server must be configured to record, and make available to authorized personnel, who added/modified/deleted DNS zone information.

    Without a means for identifying the individual that produced the information, the information cannot be relied upon. Identifying the validity of information may be delayed or deterred. This requir...
    Rule Medium Severity
  • SRG-APP-000350-DNS-000044

    Group
  • The Windows 2012 DNS Server must, in the event of an error validating another DNS servers identity, send notification to the DNS administrator.

    Failing to act on the validation errors may result in the use of invalid, corrupted, or compromised information. The validation of bindings can be achieved, for example, by the use of cryptographic...
    Rule Medium Severity
  • SRG-APP-000089-DNS-000004

    Group
  • The Windows 2012 DNS Server log must be enabled.

    Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident, or identify those responsible for one. The actua...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules