III - Administrative Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000215-DNS-000026
<GroupDescription></GroupDescription>Group -
Automatic Update of Trust Anchors must be enabled on key rollover.
<VulnDiscussion>A trust anchor is a preconfigured public key associated with a specific zone. A validating DNS server must be configured with...Rule Medium Severity -
SRG-APP-000423-DNS-000056
<GroupDescription></GroupDescription>Group -
The Windows DNS secondary servers must request data origin authentication verification from the primary server when requesting name/address resolution.
<VulnDiscussion>If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it m...Rule Medium Severity -
SRG-APP-000424-DNS-000057
<GroupDescription></GroupDescription>Group -
The Windows DNS secondary server must request data integrity verification from the primary server when requesting name/address resolution.
<VulnDiscussion>If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it m...Rule Medium Severity -
SRG-APP-000425-DNS-000058
<GroupDescription></GroupDescription>Group -
The Windows DNS secondary server must validate data integrity verification on the name/address resolution responses received from primary name servers.
<VulnDiscussion>If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it m...Rule Medium Severity -
SRG-APP-000426-DNS-000059
<GroupDescription></GroupDescription>Group -
The Windows DNS secondary server must validate data origin verification authentication on the name/address resolution responses received from primary name servers.
<VulnDiscussion>If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it m...Rule Medium Severity -
SRG-APP-000219-DNS-000028
<GroupDescription></GroupDescription>Group -
The Windows DNS Server must protect the authenticity of zone transfers via transaction signing.
<VulnDiscussion>Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. This...Rule Medium Severity -
SRG-APP-000219-DNS-000029
<GroupDescription></GroupDescription>Group -
The Windows DNS Server must protect the authenticity of dynamic updates via transaction signing.
<VulnDiscussion>DNS is a fundamental network service that is prone to various attacks, such as cache poisoning and man-in-the middle attacks....Rule High Severity -
SRG-APP-000219-DNS-000030
<GroupDescription></GroupDescription>Group -
The Windows DNS Server must protect the authenticity of query responses via DNSSEC.
<VulnDiscussion>The underlying feature in the major threat associated with DNS query/response (i.e., forged response or response failure) is ...Rule Medium Severity -
SRG-APP-000427-DNS-000060
<GroupDescription></GroupDescription>Group -
The Windows DNS Server must use an approved DOD PKI certificate authority.
<VulnDiscussion>Untrusted certificate authorities (CA) can issue certificates, but the certificates may be issued by organizations or individ...Rule Medium Severity -
SRG-APP-000231-DNS-000033
<GroupDescription></GroupDescription>Group -
The Windows DNS Server must protect secret/private cryptographic keys while at rest.
<VulnDiscussion>Information at rest refers to the state of information when it is located on a secondary storage device within an organizatio...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.