Skip to content

II - Mission Support Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000348-DNS-000042

    Group
  • The Windows DNS Server must be configured to record who added/modified/deleted DNS zone information.

    Without a means for identifying the individual that produced the information, the information cannot be relied on. Identifying the validity of information may be delayed or deterred. This requirem...
    Rule Medium Severity
  • SRG-APP-000350-DNS-000044

    Group
  • The Windows DNS Server must notify the DNS administrator in the event of an error validating another DNS server's identity.

    Failing to act on validation errors may result in the use of invalid, corrupted, or compromised information. The validation of bindings can be achieved, for example, using cryptographic checksums. ...
    Rule Medium Severity
  • SRG-APP-000089-DNS-000004

    Group
  • The Windows DNS Server log must be enabled.

    Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. The actual...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000500

    Group
  • The "Manage auditing and security log" user right must be assigned only to authorized personnel.

    Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. The actual...
    Rule Medium Severity
  • SRG-APP-000214-DNS-000079

    Group
  • The validity period for the Resource Record Signatures (RRSIGs) covering the Delegation Signer (DS) Resource Record (RR) for a zone's delegated children must be no less than two days and no more than one week.

    The best way for a zone administrator to minimize the impact of a key compromise is by limiting the validity period of RRSIGs in the zone and the parent zone. This strategy limits the time during w...
    Rule Medium Severity
  • SRG-APP-000218-DNS-000027

    Group
  • The Windows DNS name servers for a zone must be geographically dispersed.

    In addition to network-based separation, authoritative name servers should be dispersed geographically. In other words, in addition to being located on different network segments, the authoritative...
    Rule Medium Severity
  • SRG-APP-000383-DNS-000047

    Group
  • The Windows DNS Server must prohibit recursion on authoritative name servers for which forwarders have not been configured for external queries.

    A potential vulnerability of DNS is that an attacker can poison a name server's cache by sending queries that will cause the server to obtain host-to-IP address mappings from bogus name servers tha...
    Rule Medium Severity
  • SRG-APP-000383-DNS-000047

    Group
  • Forwarders on an authoritative Windows DNS Server, if enabled for external resolution, must forward only to an internal, non-Active Directory (AD)-integrated DNS server or to the DOD Enterprise Recursive Services (ERS).

    A potential vulnerability of DNS is that an attacker can poison a name server's cache by sending queries that will cause the server to obtain host-to-IP address mappings from bogus name servers tha...
    Rule Medium Severity
  • SRG-APP-000383-DNS-000047

    Group
  • The Windows DNS Server with a caching name server role must restrict recursive query responses to only the IP addresses and IP address ranges of known supported clients.

    A potential vulnerability of DNS is that an attacker can poison a name server's cache by sending queries that will cause the server to obtain host-to-IP address mappings from bogus name servers tha...
    Rule High Severity
  • SRG-APP-000440-DNS-000065

    Group
  • The Windows DNS Server must implement cryptographic mechanisms to detect changes to information during transmission.

    Encrypting information for transmission protects it from unauthorized disclosure and modification. Cryptographic mechanisms implemented to protect information integrity include, for example, crypto...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000078

    Group
  • The validity period for the Resource Record Signatures (RRSIGs) covering a zone's DNSKEY RRSet must be no less than two days and no more than one week.

    The best way for a zone administrator to minimize the impact of a key compromise is by limiting the validity period of RRSIGs in the zone and the parent zone. This strategy limits the time during w...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000084

    Group
  • NSEC3 must be used for all internal DNS zones.

    NSEC records list the resource record types for the name, as well as the name of the next resource record. This information reveals that the resource record type for the name queried, or the resour...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000085

    Group
  • The Windows DNS Server's zone files must have NS records that point to active name servers authoritative for the domain specified in that record.

    Poorly constructed NS records pose a security risk because they create conditions under which an adversary might be able to provide the missing authoritative name services that are improperly speci...
    Rule High Severity
  • SRG-APP-000516-DNS-000087

    Group
  • All authoritative name servers for a zone must be located on different network segments.

    Most enterprises have an authoritative primary server and a host of authoritative secondary name servers. It is essential that these authoritative name servers for an enterprise be located on diffe...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000088

    Group
  • All authoritative name servers for a zone must have the same version of zone information.

    The only protection approach for content control of a DNS zone file is the use of a zone file integrity checker. The effectiveness of integrity checking using a zone file integrity checker depends ...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000089

    Group
  • The Windows DNS Server must be configured to enable DNSSEC Resource Records (RRs).

    The specification for a digital signature mechanism in the context of the DNS infrastructure is in the Internet Engineering Task Force's (IETF's) DNSSEC standard. In DNSSEC, trust in the public key...
    Rule High Severity
  • SRG-APP-000516-DNS-000090

    Group
  • The digital signature algorithm used for DNSSEC-enabled zones must be FIPS-compatible.

    The choice of digital signature algorithm will be based on recommended algorithms in well-known standards. NIST's Digital Signature Standard (DSS) (FIPS186) provides three algorithm choices: - Digi...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000091

    Group
  • For zones split between the external and internal sides of a network, the resource records (RRs) for the external hosts must be separate from the RRs for the internal hosts.

    Authoritative name servers for an enterprise may be configured to receive requests from both external and internal clients. External clients need to receive RRs that pertain only to public servic...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000092

    Group
  • In a split DNS configuration between the external and internal networks, the external name server must be configured to not be reachable from inside resolvers.

    Instead of having the same set of authoritative name servers serve different types of clients, an enterprise could have two different sets of authoritative name servers. One set, called external ...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000095

    Group
  • Primary authoritative name servers must be configured to only receive zone transfer requests from specified secondary name servers.

    Authoritative name servers (especially primary name servers) should be configured with an allow-transfer access control substatement designating the list of hosts from which zone transfer requests ...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000099

    Group
  • The Windows DNS Servers zone database files must not be accessible for edit/write by users and/or processes other than the Windows DNS Server service account and/or the DNS database administrator.

    Discretionary Access Control (DAC) is based on the premise that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in whic...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000101

    Group
  • The Windows DNS Server must implement internal/external role separation.

    DNS servers with an internal role only process name/address resolution requests from within the organization (i.e., internal clients). DNS servers with an external role only process name/address re...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000102

    Group
  • The Windows DNS Server authoritative for local zones must only point root hints to the DNS servers that host the internal root domain.

    All caching name servers must be authoritative for the root zone because, without this starting point, they would have no knowledge of the DNS infrastructure and thus would be unable to respond to ...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000113

    Group
  • The Windows DNS Servers zone files must not include resource records that resolve to a fully qualified domain name residing in another zone.

    If a name server could claim authority for a resource record in a domain for which it was not authoritative, this would pose a security risk. In this environment, an adversary could use illicit con...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000114

    Group
  • The Windows DNS Server's zone files must not include CNAME records pointing to a zone with lesser security for more than six months.

    The use of CNAME records for exercises, tests, or zone-spanning (pointing to zones with lesser security) aliases should be temporary (e.g., to facilitate a migration) and not be in place for more t...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules