I - Mission Critical Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000275-DNS-000040
<GroupDescription></GroupDescription>Group -
The Windows DNS Server must be configured to notify the information system security officer (ISSO), information system security manager (ISSM), or DNS administrator when functionality of DNSSEC/TSIG has been removed or broken.
<VulnDiscussion>Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing t...Rule Medium Severity -
SRG-APP-000176-DNS-000076
<GroupDescription></GroupDescription>Group -
A unique Transaction Signature (TSIG) key must be generated for each pair of communicating hosts.
<VulnDiscussion>To enable zone transfer (requests and responses) through authenticated messages, it is necessary to generate a key for every ...Rule Medium Severity -
SRG-APP-000185-DNS-000021
<GroupDescription></GroupDescription>Group -
The DNS server implementation must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.
<VulnDiscussion>If unauthorized personnel use maintenance tools, they may accidentally or intentionally damage or compromise the system. The ...Rule Medium Severity -
SRG-APP-000226-DNS-000032
<GroupDescription></GroupDescription>Group -
In the event of a system failure, the Windows DNS Server must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes.
<VulnDiscussion>Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Fa...Rule Medium Severity -
SRG-APP-000516-DNS-000105
<GroupDescription></GroupDescription>Group -
The DNS Name Server software must run with restricted privileges.
<VulnDiscussion>Failure to provide logical access restrictions associated with changes to application configuration may have significant effe...Rule Medium Severity -
SRG-APP-000516-DNS-000112
<GroupDescription></GroupDescription>Group -
The private keys corresponding to both the zone signing key (ZSK) and the key signing key (KSK) must not be kept on the DNSSEC-aware primary authoritative name server when the name server does not support dynamic updates.
<VulnDiscussion>The private keys in the KSK and ZSK key pairs must be protected from unauthorized access. If possible, the private keys shoul...Rule Medium Severity -
SRG-APP-000125-DNS-000012
<GroupDescription></GroupDescription>Group -
The Windows DNS Server audit records must be backed up at least every seven days onto a different system or system component than the system or component being audited.
<VulnDiscussion>Protection of log data includes ensuring log data is not accidentally lost or deleted. Backing up audit records to a differen...Rule Medium Severity -
SRG-APP-000516-DNS-000093
<GroupDescription></GroupDescription>Group -
In a split DNS configuration, where separate name servers are used between the external and internal networks, the internal name server must be configured to not be reachable from outside resolvers.
<VulnDiscussion>Instead of having the same set of authoritative name servers serve different types of clients, an enterprise could have two d...Rule Medium Severity -
SRG-APP-000247-DNS-000036
<GroupDescription></GroupDescription>Group -
Windows DNS response rate limiting (RRL) must be enabled.
<VulnDiscussion>This setting can prevent someone from sending a denial-of-service attack using the DNS servers. For instance, a bot net can s...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.