Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000243-DNS-000034

    <GroupDescription></GroupDescription>
    Group
  • A BIND 9.x server implementation must be running in a chroot(ed) directory structure.

    &lt;VulnDiscussion&gt;With any network service, there is the potential that an attacker can exploit a vulnerability within the program that allows ...
    Rule Low Severity
  • SRG-APP-000516-DNS-000097

    <GroupDescription></GroupDescription>
    Group
  • A BIND 9.x server implementation must be operating on a Current-Stable version as defined by ISC.

    &lt;VulnDiscussion&gt;The BIND STIG was written to incorporate capabilities and features provided in BIND version 9.9.x. However, it is recognized ...
    Rule High Severity
  • SRG-APP-000516-DNS-000109

    <GroupDescription></GroupDescription>
    Group
  • The platform on which the name server software is hosted must only run processes and services needed to support the BIND 9.x implementation.

    &lt;VulnDiscussion&gt;Hosts that run the name server software should not provide any other services. Unnecessary services running on the DNS server...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000105

    <GroupDescription></GroupDescription>
    Group
  • The BIND 9.x server software must run with restricted privileges.

    &lt;VulnDiscussion&gt;Failure to provide logical access restrictions associated with changes to application configuration may have significant effe...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000109

    <GroupDescription></GroupDescription>
    Group
  • The host running a BIND 9.X implementation must implement a set of firewall rules that restrict traffic on the DNS interface.

    &lt;VulnDiscussion&gt;Configuring hosts that run a BIND 9.X implementation to only accept DNS traffic on a DNS interface allows a system firewall t...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000109

    <GroupDescription></GroupDescription>
    Group
  • The host running a BIND 9.x implementation must use a dedicated management interface in order to separate management traffic from DNS specific traffic.

    &lt;VulnDiscussion&gt;Providing Out-Of-Band (OOB) management is the best first step in any management strategy. No production traffic resides on an...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000109

    <GroupDescription></GroupDescription>
    Group
  • The host running a BIND 9.x implementation must use an interface that is configured to process only DNS traffic.

    &lt;VulnDiscussion&gt;Configuring hosts that run a BIND 9.X implementation to only accept DNS traffic on a DNS interface allows a system to be conf...
    Rule Medium Severity
  • SRG-APP-000089-DNS-000004

    <GroupDescription></GroupDescription>
    Group
  • A BIND 9.x server implementation must be configured to allow DNS administrators to audit all DNS server components, based on selectable event criteria, and produce audit records within all DNS server components that contain information for failed security verification tests, information to establish the outcome and source of the events, any information necessary to determine cause of failure, and any information necessary to return to operations with least disruption to mission processes.

    &lt;VulnDiscussion&gt;Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events r...
    Rule Low Severity
  • SRG-APP-000125-DNS-000012

    <GroupDescription></GroupDescription>
    Group
  • The BIND 9.x server implementation must not be configured with a channel to send audit records to null.

    &lt;VulnDiscussion&gt;DNS software administrators require DNS transaction logs for a wide variety of reasons including troubleshooting, intrusion d...
    Rule Low Severity
  • SRG-APP-000089-DNS-000005

    <GroupDescription></GroupDescription>
    Group
  • The BIND 9.x server logging configuration must be configured to generate audit records for all DoD-defined auditable events to a local file by enabling triggers for all events with a severity of info, notice, warning, error, and critical for all DNS components.

    &lt;VulnDiscussion&gt;Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events r...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules