Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000424-DNS-000057

    Group
  • The Windows DNS secondary server must request data integrity verification from the primary server when requesting name/address resolution.

    If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercep...
    Rule Medium Severity
  • SRG-APP-000425-DNS-000058

    Group
  • The Windows DNS secondary server must validate data integrity verification on the name/address resolution responses received from primary name servers.

    If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercep...
    Rule Medium Severity
  • SRG-APP-000426-DNS-000059

    Group
  • The Windows DNS secondary server must validate data origin verification authentication on the name/address resolution responses received from primary name servers.

    If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercep...
    Rule Medium Severity
  • SRG-APP-000219-DNS-000028

    Group
  • The Windows DNS Server must protect the authenticity of zone transfers via transaction signing.

    Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. This applies to server-to-server (zone transfer) transactions and is provide...
    Rule Medium Severity
  • SRG-APP-000219-DNS-000029

    Group
  • The Windows DNS Server must protect the authenticity of dynamic updates via transaction signing.

    DNS is a fundamental network service that is prone to various attacks, such as cache poisoning and man-in-the middle attacks. If communication sessions are not provided appropriate validity protect...
    Rule High Severity
  • SRG-APP-000219-DNS-000030

    Group
  • The Windows DNS Server must protect the authenticity of query responses via DNSSEC.

    The underlying feature in the major threat associated with DNS query/response (i.e., forged response or response failure) is the integrity of DNS data returned in the response. An integral part of ...
    Rule Medium Severity
  • SRG-APP-000427-DNS-000060

    Group
  • The Windows DNS Server must use an approved DOD PKI certificate authority.

    Untrusted certificate authorities (CA) can issue certificates, but the certificates may be issued by organizations or individuals that seek to compromise DOD systems or by organizations with insuff...
    Rule Medium Severity
  • SRG-APP-000231-DNS-000033

    Group
  • The Windows DNS Server must protect secret/private cryptographic keys while at rest.

    Information at rest refers to the state of information when it is located on a secondary storage device within an organizational information system. Mobile devices, laptops, desktops, and storage d...
    Rule Medium Severity
  • SRG-APP-000428-DNS-000061

    Group
  • The Windows DNS Server must only contain zone records that have been validated annually.

    If zone information has not been validated in more than a year, there is no assurance that it is still valid. If invalid records are in a zone, an adversary could potentially use their existence fo...
    Rule Medium Severity
  • SRG-APP-000246-DNS-000035

    Group
  • The Windows DNS Server must restrict individuals from using it for launching denial-of-service (DoS) attacks against other information systems.

    Applications and application developers must take steps to ensure users cannot use an authorized application to launch DoS attacks against other systems and networks. For example, applications may ...
    Rule Medium Severity
  • SRG-APP-000247-DNS-000036

    Group
  • The Windows DNS Server must use DNS Notify to prevent denial of service (DoS) through increase in workload.

    In the case of application DoS attacks, care must be taken when designing the application to ensure it makes the best use of system resources. SQL queries have the potential to consume large amount...
    Rule Medium Severity
  • SRG-APP-000439-DNS-000063

    Group
  • The Windows DNS Server must protect the integrity of transmitted information.

    Without protection of the transmitted information, confidentiality and integrity may be compromised because unprotected communications can be intercepted and either read or altered. Communication ...
    Rule High Severity
  • SRG-APP-000441-DNS-000066

    Group
  • The Windows DNS Server must maintain the integrity of information during preparation for transmission.

    Information can be unintentionally or maliciously disclosed or modified during preparation for transmission, including, for example, during aggregation, at protocol transformation points, and durin...
    Rule Medium Severity
  • SRG-APP-000442-DNS-000067

    Group
  • The Windows DNS Server must maintain the integrity of information during reception.

    Information can be unintentionally or maliciously disclosed or modified during preparation for transmission, including, for example, during aggregation, at protocol transformation points, and durin...
    Rule Medium Severity
  • SRG-APP-000514-DNS-000075

    Group
  • The Windows DNS Server must implement NIST FIPS-validated cryptography for provisioning digital signatures, generating cryptographic hashes, and protecting unclassified information requiring confidentiality.

    Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The application must implement cryptographic modules adhering to the higher standards appr...
    Rule Medium Severity
  • SRG-APP-000251-DNS-000037

    Group
  • The Windows DNS Server must be configured to only allow zone information that reflects the environment for which it is authoritative, including IP ranges and IP versions.

    DNS zone data for which a Windows DNS Server is authoritative should represent the network for which it is responsible. If a Windows DNS Server hosts zone records for other networks or environments...
    Rule Medium Severity
  • SRG-APP-000451-DNS-000069

    Group
  • The Windows DNS Server must follow procedures to re-role a secondary name server as the primary name server if the primary name server permanently loses functionality.

    Failing to an unsecure condition negatively impacts application security and can lead to system compromise. Failure conditions include, for example, loss of communications among critical system com...
    Rule Medium Severity
  • SRG-APP-000333-DNS-000104

    Group
  • The DNS Name Server software must be configured to refuse queries for its version information.

    Each newer version of the name server software, especially the BIND software, generally is devoid of vulnerabilities found in earlier versions because it has design changes incorporated to address ...
    Rule Medium Severity
  • SRG-APP-000333-DNS-000107

    Group
  • The HINFO, RP, TXT, and LOC RR types must not be used in the zone SOA.

    Several types of resource records (RRs) in the DNS are meant to convey information to humans and applications about the network, hosts, or services. These RRs include the Responsible Person (RP) re...
    Rule Medium Severity
  • SRG-APP-000268-DNS-000039

    Group
  • The Windows DNS Server must, when a component failure is detected, activate a notification to the system administrator.

    Predictable failure prevention requires organizational planning to address system failure issues. If components key to maintaining systems security fail to function, the system could continue opera...
    Rule Medium Severity
  • SRG-APP-000473-DNS-000072

    Group
  • The Windows DNS Server must verify the correct operation of security functions upon startup and/or restart, upon command by a user with privileged access, and/or every 30 days.

    Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing the system security policy and supporting the isolation of code and data ...
    Rule Medium Severity
  • SRG-APP-000473-DNS-000072

    Group
  • The Windows DNS Server must verify the correct operation of security functions upon system startup and/or restart, upon command by a user with privileged access, and/or every 30 days.

    Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing the system security policy and supporting the isolation of code and data ...
    Rule Medium Severity
  • SRG-APP-000474-DNS-000073

    Group
  • The Windows DNS Server must log the event and notify the system administrator when anomalies in the operation of the signed zone transfers are discovered.

    Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing the system security policy and supporting the isolation of code and data ...
    Rule Medium Severity
  • SRG-APP-000275-DNS-000040

    Group
  • The Windows DNS Server must be configured to notify the information system security officer (ISSO), information system security manager (ISSM), or DNS administrator when functionality of DNSSEC/TSIG has been removed or broken.

    Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing the system security policy and supporting the isolation of code and data ...
    Rule Medium Severity
  • SRG-APP-000176-DNS-000076

    Group
  • A unique Transaction Signature (TSIG) key must be generated for each pair of communicating hosts.

    To enable zone transfer (requests and responses) through authenticated messages, it is necessary to generate a key for every pair of name servers. The key also can be used for securing other transa...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules