I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000383-DNS-000047
<GroupDescription></GroupDescription>Group -
Forwarders on an authoritative Windows 2012 DNS Server, if enabled for external resolution, must only forward to either an internal, non-AD-integrated DNS server or to the DoD Enterprise Recursive Services (ERS).
<VulnDiscussion>A potential vulnerability of DNS is that an attacker can poison a name server's cache by sending queries that will cause the ...Rule Medium Severity -
SRG-APP-000383-DNS-000047
<GroupDescription></GroupDescription>Group -
The Windows 2012 DNS Server with a caching name server role must restrict recursive query responses to only the IP addresses and IP address ranges of known supported clients.
<VulnDiscussion>A potential vulnerability of DNS is that an attacker can poison a name server's cache by sending queries that will cause the ...Rule Medium Severity -
SRG-APP-000383-DNS-000047
<GroupDescription></GroupDescription>Group -
The Windows 2012 DNS Server with a caching name server role must be secured against pollution by ensuring the authenticity and integrity of queried records.
<VulnDiscussion>A potential vulnerability of DNS is that an attacker can poison a name server's cache by sending queries that will cause the ...Rule Medium Severity -
SRG-APP-000440-DNS-000065
<GroupDescription></GroupDescription>Group -
The Windows 2012 DNS Server must implement cryptographic mechanisms to detect changes to information during transmission unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Protected Distribution System (PDS).
<VulnDiscussion>Encrypting information for transmission protects information from unauthorized disclosure and modification. Cryptographic mec...Rule Medium Severity -
SRG-APP-000516-DNS-000078
<GroupDescription></GroupDescription>Group -
The validity period for the RRSIGs covering a zones DNSKEY RRSet must be no less than two days and no more than one week.
<VulnDiscussion>The best way for a zone administrator to minimize the impact of a key compromise is by limiting the validity period of RRSIGs...Rule Medium Severity -
SRG-APP-000516-DNS-000084
<GroupDescription></GroupDescription>Group -
NSEC3 must be used for all internal DNS zones.
<VulnDiscussion>NSEC records list the resource record types for the name, as well as the name of the next resource record. With this informat...Rule Medium Severity -
SRG-APP-000516-DNS-000085
<GroupDescription></GroupDescription>Group -
The Windows 2012 DNS Servers zone files must have NS records that point to active name servers authoritative for the domain specified in that record.
<VulnDiscussion>Poorly constructed NS records pose a security risk because they create conditions under which an adversary might be able to p...Rule High Severity -
SRG-APP-000516-DNS-000087
<GroupDescription></GroupDescription>Group -
All authoritative name servers for a zone must be located on different network segments.
<VulnDiscussion>Most enterprises have an authoritative primary server and a host of authoritative secondary name servers. It is essential tha...Rule Medium Severity -
SRG-APP-000516-DNS-000088
<GroupDescription></GroupDescription>Group -
All authoritative name servers for a zone must have the same version of zone information.
<VulnDiscussion>The only protection approach for content control of a DNS zone file is the use of a zone file integrity checker. The effectiv...Rule Medium Severity -
SRG-APP-000516-DNS-000089
<GroupDescription></GroupDescription>Group -
The Windows 2012 DNS Server must be configured to enable DNSSEC Resource Records.
<VulnDiscussion>The specification for a digital signature mechanism in the context of the DNS infrastructure is in IETF's DNSSEC standard. I...Rule High Severity -
SRG-APP-000516-DNS-000090
<GroupDescription></GroupDescription>Group -
Digital signature algorithm used for DNSSEC-enabled zones must be FIPS-compatible.
<VulnDiscussion>The choice of digital signature algorithm will be based on recommended algorithms in well-known standards. NIST's Digital Sig...Rule Medium Severity -
SRG-APP-000516-DNS-000091
<GroupDescription></GroupDescription>Group -
For zones split between the external and internal sides of a network, the RRs for the external hosts must be separate from the RRs for the internal hosts.
<VulnDiscussion>Authoritative name servers for an enterprise may be configured to receive requests from both external and internal clients. ...Rule Medium Severity -
SRG-APP-000516-DNS-000092
<GroupDescription></GroupDescription>Group -
In a split DNS configuration, where separate name servers are used between the external and internal networks, the external name server must be configured to not be reachable from inside resolvers.
<VulnDiscussion>Instead of having the same set of authoritative name servers serve different types of clients, an enterprise could have two d...Rule Medium Severity -
SRG-APP-000516-DNS-000093
<GroupDescription></GroupDescription>Group -
In a split DNS configuration, where separate name servers are used between the external and internal networks, the internal name server must be configured to not be reachable from outside resolvers.
<VulnDiscussion>Instead of having the same set of authoritative name servers serve different types of clients, an enterprise could have two d...Rule Medium Severity -
SRG-APP-000516-DNS-000095
<GroupDescription></GroupDescription>Group -
Primary authoritative name servers must be configured to only receive zone transfer requests from specified secondary name servers.
<VulnDiscussion>Authoritative name servers (especially primary name servers) should be configured with an allow-transfer access control sub s...Rule Medium Severity -
SRG-APP-000516-DNS-000099
<GroupDescription></GroupDescription>Group -
The Windows 2012 DNS Servers zone database files must not be accessible for edit/write by users and/or processes other than the Windows 2012 DNS Server service account and/or the DNS database administrator.
<VulnDiscussion>Discretionary Access Control (DAC) is based on the premise that individual users are "owners" of objects and therefore have d...Rule Medium Severity -
SRG-APP-000516-DNS-000101
<GroupDescription></GroupDescription>Group -
The Windows 2012 DNS Server must implement internal/external role separation.
<VulnDiscussion>DNS servers with an internal role only process name/address resolution requests from within the organization (i.e., internal ...Rule Medium Severity -
SRG-APP-000516-DNS-000102
<GroupDescription></GroupDescription>Group -
The Windows 2012 DNS Server authoritative for local zones must only point root hints to the DNS servers that host the internal root domain.
<VulnDiscussion>All caching name servers must be authoritative for the root zone because, without this starting point, they would have no kno...Rule Medium Severity -
SRG-APP-000516-DNS-000103
<GroupDescription></GroupDescription>Group -
The DNS name server software must be at the latest version.
<VulnDiscussion>Each newer version of the name server software, especially the BIND software, generally is devoid of vulnerabilities found in...Rule Medium Severity -
SRG-APP-000516-DNS-000113
<GroupDescription></GroupDescription>Group -
The Windows 2012 DNS Servers zone files must not include resource records that resolve to a fully qualified domain name residing in another zone.
<VulnDiscussion>If a name server were able to claim authority for a resource record in a domain for which it was not authoritative, this woul...Rule Medium Severity -
SRG-APP-000516-DNS-000114
<GroupDescription></GroupDescription>Group -
The Windows 2012 DNS Servers zone files must not include CNAME records pointing to a zone with lesser security for more than six months.
<VulnDiscussion>The use of CNAME records for exercises, tests, or zone-spanning (pointing to zones with lesser security) aliases should be te...Rule Medium Severity -
SRG-APP-000516-DNS-000500
<GroupDescription></GroupDescription>Group -
Non-routable IPv6 link-local scope addresses must not be configured in any zone.
<VulnDiscussion>IPv6 link-local scope addresses are not globally routable and must not be configured in any DNS zone. Similar to RFC1918 add...Rule Medium Severity -
SRG-APP-000516-DNS-000500
<GroupDescription></GroupDescription>Group -
AAAA addresses must not be configured in a zone for hosts that are not IPv6-aware.
<VulnDiscussion>DNS is only responsible for resolving a domain name to an IP address. Applications and operating systems are responsible for...Rule Medium Severity -
SRG-APP-000142-DNS-000014
<GroupDescription></GroupDescription>Group -
The Windows 2012 DNS Server must be configured to prohibit or restrict unapproved ports and protocols.
<VulnDiscussion>In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....Rule Medium Severity -
SRG-APP-000390-DNS-000048
<GroupDescription></GroupDescription>Group -
The Windows 2012 DNS Server must require devices to re-authenticate for each dynamic update request connection attempt.
<VulnDiscussion>Without re-authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.