Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000333-DNS-000107

    <GroupDescription></GroupDescription>
    Group
  • The HINFO, RP, TXT, and LOC RR types must not be used in the zone SOA.

    &lt;VulnDiscussion&gt;Several types of resource records (RRs) in the DNS are meant to convey information to humans and applications about the netwo...
    Rule Medium Severity
  • SRG-APP-000268-DNS-000039

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must, when a component failure is detected, activate a notification to the system administrator.

    &lt;VulnDiscussion&gt;Predictable failure prevention requires organizational planning to address system failure issues. If components key to mainta...
    Rule Medium Severity
  • SRG-APP-000473-DNS-000072

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must verify the correct operation of security functions upon startup and/or restart, upon command by a user with privileged access, and/or every 30 days.

    &lt;VulnDiscussion&gt;Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing t...
    Rule Medium Severity
  • SRG-APP-000473-DNS-000072

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must verify the correct operation of security functions upon system startup and/or restart, upon command by a user with privileged access, and/or every 30 days.

    &lt;VulnDiscussion&gt;Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing t...
    Rule Medium Severity
  • SRG-APP-000474-DNS-000073

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must log the event and notify the system administrator when anomalies in the operation of the signed zone transfers are discovered.

    &lt;VulnDiscussion&gt;Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing t...
    Rule Medium Severity
  • SRG-APP-000275-DNS-000040

    <GroupDescription></GroupDescription>
    Group
  • The Windows DNS Server must be configured to notify the information system security officer (ISSO), information system security manager (ISSM), or DNS administrator when functionality of DNSSEC/TSIG has been removed or broken.

    &lt;VulnDiscussion&gt;Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing t...
    Rule Medium Severity
  • SRG-APP-000176-DNS-000076

    <GroupDescription></GroupDescription>
    Group
  • A unique Transaction Signature (TSIG) key must be generated for each pair of communicating hosts.

    &lt;VulnDiscussion&gt;To enable zone transfer (requests and responses) through authenticated messages, it is necessary to generate a key for every ...
    Rule Medium Severity
  • SRG-APP-000185-DNS-000021

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.

    &lt;VulnDiscussion&gt;If unauthorized personnel use maintenance tools, they may accidentally or intentionally damage or compromise the system. The ...
    Rule Medium Severity
  • SRG-APP-000226-DNS-000032

    <GroupDescription></GroupDescription>
    Group
  • In the event of a system failure, the Windows DNS Server must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes.

    &lt;VulnDiscussion&gt;Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Fa...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000105

    <GroupDescription></GroupDescription>
    Group
  • The DNS Name Server software must run with restricted privileges.

    &lt;VulnDiscussion&gt;Failure to provide logical access restrictions associated with changes to application configuration may have significant effe...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules