I - Mission Critical Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000424-DNS-000057
Group -
The Windows DNS secondary server must request data integrity verification from the primary server when requesting name/address resolution.
If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercep...Rule Medium Severity -
SRG-APP-000425-DNS-000058
Group -
The Windows DNS secondary server must validate data integrity verification on the name/address resolution responses received from primary name servers.
If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercep...Rule Medium Severity -
SRG-APP-000426-DNS-000059
Group -
The Windows DNS secondary server must validate data origin verification authentication on the name/address resolution responses received from primary name servers.
If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercep...Rule Medium Severity -
SRG-APP-000219-DNS-000028
Group -
The Windows DNS Server must protect the authenticity of zone transfers via transaction signing.
Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. This applies to server-to-server (zone transfer) transactions and is provide...Rule Medium Severity -
SRG-APP-000219-DNS-000029
Group -
The Windows DNS Server must protect the authenticity of dynamic updates via transaction signing.
DNS is a fundamental network service that is prone to various attacks, such as cache poisoning and man-in-the middle attacks. If communication sessions are not provided appropriate validity protect...Rule High Severity -
SRG-APP-000219-DNS-000030
Group -
The Windows DNS Server must protect the authenticity of query responses via DNSSEC.
The underlying feature in the major threat associated with DNS query/response (i.e., forged response or response failure) is the integrity of DNS data returned in the response. An integral part of ...Rule Medium Severity -
SRG-APP-000427-DNS-000060
Group -
The Windows DNS Server must use an approved DOD PKI certificate authority.
Untrusted certificate authorities (CA) can issue certificates, but the certificates may be issued by organizations or individuals that seek to compromise DOD systems or by organizations with insuff...Rule Medium Severity -
SRG-APP-000231-DNS-000033
Group -
The Windows DNS Server must protect secret/private cryptographic keys while at rest.
Information at rest refers to the state of information when it is located on a secondary storage device within an organizational information system. Mobile devices, laptops, desktops, and storage d...Rule Medium Severity -
SRG-APP-000428-DNS-000061
Group -
The Windows DNS Server must only contain zone records that have been validated annually.
If zone information has not been validated in more than a year, there is no assurance that it is still valid. If invalid records are in a zone, an adversary could potentially use their existence fo...Rule Medium Severity -
SRG-APP-000246-DNS-000035
Group -
The Windows DNS Server must restrict individuals from using it for launching denial-of-service (DoS) attacks against other information systems.
Applications and application developers must take steps to ensure users cannot use an authorized application to launch DoS attacks against other systems and networks. For example, applications may ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.