Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000441-DNS-000066

    <GroupDescription></GroupDescription>
    Group
  • The Windows 2012 DNS Server must maintain the integrity of information during preparation for transmission.

    &lt;VulnDiscussion&gt;Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, including...
    Rule Medium Severity
  • SRG-APP-000442-DNS-000067

    <GroupDescription></GroupDescription>
    Group
  • The Windows 2012 DNS Server must maintain the integrity of information during reception.

    &lt;VulnDiscussion&gt;Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, including...
    Rule Medium Severity
  • SRG-APP-000514-DNS-000075

    <GroupDescription></GroupDescription>
    Group
  • The Windows 2012 DNS Server must implement NIST FIPS-validated cryptography for provisioning digital signatures, generating cryptographic hashes, and protecting unclassified information requiring confidentiality.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The applicatio...
    Rule Medium Severity
  • SRG-APP-000251-DNS-000037

    <GroupDescription></GroupDescription>
    Group
  • The Windows 2012 DNS Server must be configured to only allow zone information that reflects the environment for which it is authoritative, to include IP ranges and IP versions.

    &lt;VulnDiscussion&gt;DNS zone data for which a Windows 2012 DNS server is authoritative should represent the network for which it is responsible. ...
    Rule Medium Severity
  • SRG-APP-000451-DNS-000069

    <GroupDescription></GroupDescription>
    Group
  • The Windows 2012 DNS Server must follow procedures to re-role a secondary name server as the master name server should the master name server permanently lose functionality.

    &lt;VulnDiscussion&gt;Failing to an unsecure condition negatively impacts application security and can lead to system compromise. Failure condition...
    Rule Medium Severity
  • SRG-APP-000333-DNS-000104

    <GroupDescription></GroupDescription>
    Group
  • The DNS Name Server software must be configured to refuse queries for its version information.

    &lt;VulnDiscussion&gt;Each newer version of the name server software, especially the BIND software, generally is devoid of vulnerabilities found in...
    Rule Medium Severity
  • SRG-APP-000333-DNS-000107

    <GroupDescription></GroupDescription>
    Group
  • The HINFO, RP, TXT and LOC RR types must not be used in the zone SOA.

    &lt;VulnDiscussion&gt;There are several types of RRs in the DNS that are meant to convey information to humans and applications about the network, ...
    Rule Medium Severity
  • SRG-APP-000268-DNS-000039

    <GroupDescription></GroupDescription>
    Group
  • The Windows 2012 DNS Server must, when a component failure is detected, activate a notification to the system administrator.

    &lt;VulnDiscussion&gt;Predictable failure prevention requires organizational planning to address system failure issues. If components key to mainta...
    Rule Medium Severity
  • SRG-APP-000473-DNS-000072

    <GroupDescription></GroupDescription>
    Group
  • The Windows 2012 DNS Server must perform verification of the correct operation of security functions: upon system start-up and/or restart; upon command by a user with privileged access; and/or every 30 days.

    &lt;VulnDiscussion&gt;Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing t...
    Rule Medium Severity
  • SRG-APP-000474-DNS-000073

    <GroupDescription></GroupDescription>
    Group
  • The Windows 2012 DNS Server must log the event and notify the system administrator when anomalies in the operation of the signed zone transfers are discovered.

    &lt;VulnDiscussion&gt;Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing t...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules