Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000215-DNS-000026

    <GroupDescription></GroupDescription>
    Group
  • Automatic Update of Trust Anchors must be enabled on key rollover.

    &lt;VulnDiscussion&gt;A trust anchor is a preconfigured public key associated with a specific zone. A validating DNS server must be configured with...
    Rule Medium Severity
  • SRG-APP-000423-DNS-000056

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS secondary servers must request data origin authentication verification from the primary server when requesting name/address resolution.

    &lt;VulnDiscussion&gt;If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it m...
    Rule Medium Severity
  • SRG-APP-000424-DNS-000057

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS secondary server must request data integrity verification from the primary server when requesting name/address resolution.

    &lt;VulnDiscussion&gt;If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it m...
    Rule Medium Severity
  • SRG-APP-000425-DNS-000058

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS secondary server must validate data integrity verification on the name/address resolution responses received from primary name servers.

    &lt;VulnDiscussion&gt;If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it m...
    Rule Medium Severity
  • SRG-APP-000426-DNS-000059

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS secondary server must validate data origin verification authentication on the name/address resolution responses received from primary name servers.

    &lt;VulnDiscussion&gt;If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it m...
    Rule Medium Severity
  • SRG-APP-000219-DNS-000028

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must protect the authenticity of zone transfers via transaction signing.

    &lt;VulnDiscussion&gt;Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. This...
    Rule Medium Severity
  • SRG-APP-000219-DNS-000029

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must protect the authenticity of dynamic updates via transaction signing.

    &lt;VulnDiscussion&gt;DNS is a fundamental network service that is prone to various attacks, such as cache poisoning and man-in-the middle attacks....
    Rule High Severity
  • SRG-APP-000219-DNS-000030

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must protect the authenticity of query responses via DNSSEC.

    &lt;VulnDiscussion&gt;The underlying feature in the major threat associated with DNS query/response (i.e., forged response or response failure) is ...
    Rule Medium Severity
  • SRG-APP-000427-DNS-000060

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must use an approved DOD PKI certificate authority.

    &lt;VulnDiscussion&gt;Untrusted certificate authorities (CA) can issue certificates, but the certificates may be issued by organizations or individ...
    Rule Medium Severity
  • SRG-APP-000231-DNS-000033

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must protect secret/private cryptographic keys while at rest.

    &lt;VulnDiscussion&gt;Information at rest refers to the state of information when it is located on a secondary storage device within an organizatio...
    Rule Medium Severity
  • SRG-APP-000428-DNS-000061

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must only contain zone records that have been validated annually.

    &lt;VulnDiscussion&gt;If zone information has not been validated in more than a year, there is no assurance that it is still valid. If invalid reco...
    Rule Medium Severity
  • SRG-APP-000246-DNS-000035

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must restrict individuals from using it for launching denial-of-service (DoS) attacks against other information systems.

    &lt;VulnDiscussion&gt;Applications and application developers must take steps to ensure users cannot use an authorized application to launch DoS at...
    Rule Medium Severity
  • SRG-APP-000247-DNS-000036

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must use DNS Notify to prevent denial of service (DoS) through increase in workload.

    &lt;VulnDiscussion&gt;In the case of application DoS attacks, care must be taken when designing the application to ensure it makes the best use of ...
    Rule Medium Severity
  • SRG-APP-000439-DNS-000063

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must protect the integrity of transmitted information.

    &lt;VulnDiscussion&gt;Without protection of the transmitted information, confidentiality and integrity may be compromised because unprotected commu...
    Rule High Severity
  • SRG-APP-000441-DNS-000066

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must maintain the integrity of information during preparation for transmission.

    &lt;VulnDiscussion&gt;Information can be unintentionally or maliciously disclosed or modified during preparation for transmission, including, for e...
    Rule Medium Severity
  • SRG-APP-000442-DNS-000067

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must maintain the integrity of information during reception.

    &lt;VulnDiscussion&gt;Information can be unintentionally or maliciously disclosed or modified during preparation for transmission, including, for e...
    Rule Medium Severity
  • SRG-APP-000514-DNS-000075

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must implement NIST FIPS-validated cryptography for provisioning digital signatures, generating cryptographic hashes, and protecting unclassified information requiring confidentiality.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The application mu...
    Rule Medium Severity
  • SRG-APP-000251-DNS-000037

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must be configured to only allow zone information that reflects the environment for which it is authoritative, including IP ranges and IP versions.

    &lt;VulnDiscussion&gt;DNS zone data for which a Windows DNS Server is authoritative should represent the network for which it is responsible. If a ...
    Rule Medium Severity
  • SRG-APP-000451-DNS-000069

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must follow procedures to re-role a secondary name server as the primary name server if the primary name server permanently loses functionality.

    &lt;VulnDiscussion&gt;Failing to an unsecure condition negatively impacts application security and can lead to system compromise. Failure condition...
    Rule Medium Severity
  • SRG-APP-000333-DNS-000104

    <GroupDescription></GroupDescription>
    Group
  • The DNS Name Server software must be configured to refuse queries for its version information.

    &lt;VulnDiscussion&gt;Each newer version of the name server software, especially the BIND software, generally is devoid of vulnerabilities found in...
    Rule Medium Severity
  • SRG-APP-000333-DNS-000107

    <GroupDescription></GroupDescription>
    Group
  • The HINFO, RP, TXT, and LOC RR types must not be used in the zone SOA.

    &lt;VulnDiscussion&gt;Several types of resource records (RRs) in the DNS are meant to convey information to humans and applications about the netwo...
    Rule Medium Severity
  • SRG-APP-000268-DNS-000039

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must, when a component failure is detected, activate a notification to the system administrator.

    &lt;VulnDiscussion&gt;Predictable failure prevention requires organizational planning to address system failure issues. If components key to mainta...
    Rule Medium Severity
  • SRG-APP-000473-DNS-000072

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must verify the correct operation of security functions upon startup and/or restart, upon command by a user with privileged access, and/or every 30 days.

    &lt;VulnDiscussion&gt;Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing t...
    Rule Medium Severity
  • SRG-APP-000473-DNS-000072

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must verify the correct operation of security functions upon system startup and/or restart, upon command by a user with privileged access, and/or every 30 days.

    &lt;VulnDiscussion&gt;Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing t...
    Rule Medium Severity
  • SRG-APP-000474-DNS-000073

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must log the event and notify the system administrator when anomalies in the operation of the signed zone transfers are discovered.

    &lt;VulnDiscussion&gt;Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing t...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules