Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000350-DNS-000044

    <GroupDescription></GroupDescription>
    Group
  • In the event of an error when validating the binding of other DNS servers identity to the BIND 9.x information, when anomalies in the operation of the signed zone transfers are discovered, for the success and failure of start and stop of the name server service or daemon, and for the success and failure of all name server events, a BIND 9.x server implementation must generate a log entry.

    &lt;VulnDiscussion&gt;Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is ...
    Rule Low Severity
  • SRG-APP-000095-DNS-000006

    <GroupDescription></GroupDescription>
    Group
  • The print-severity variable for the configuration of BIND 9.x server logs must be configured to produce audit records containing information to establish what type of events occurred.

    &lt;VulnDiscussion&gt;Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is ...
    Rule Low Severity
  • SRG-APP-000096-DNS-000007

    <GroupDescription></GroupDescription>
    Group
  • The print-time variable for the configuration of BIND 9.x server logs must be configured to establish when (date and time) the events occurred.

    &lt;VulnDiscussion&gt;Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events relating to a...
    Rule Low Severity
  • SRG-APP-000097-DNS-000008

    <GroupDescription></GroupDescription>
    Group
  • The print-category variable for the configuration of BIND 9.x server logs must be configured to record information indicating which process generated the events.

    &lt;VulnDiscussion&gt;Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events relating to ...
    Rule Low Severity
  • SRG-APP-000125-DNS-000012

    <GroupDescription></GroupDescription>
    Group
  • The BIND 9.x server implementation must be configured with a channel to send audit records to a remote syslog.

    &lt;VulnDiscussion&gt;Protection of log data includes assuring log data is not accidentally lost or deleted. Backing up audit records to a differen...
    Rule Low Severity
  • SRG-APP-000125-DNS-000012

    <GroupDescription></GroupDescription>
    Group
  • The BIND 9.x server implementation must be configured with a channel to send audit records to a local file.

    &lt;VulnDiscussion&gt;DNS software administrators require DNS transaction logs for a wide variety of reasons including troubleshooting, intrusion d...
    Rule Low Severity
  • SRG-APP-000125-DNS-000012

    <GroupDescription></GroupDescription>
    Group
  • The BIND 9.x server implementation must maintain at least 3 file versions of the local log file.

    &lt;VulnDiscussion&gt;DNS software administrators require DNS transaction logs for a wide variety of reasons including troubleshooting, intrusion d...
    Rule Low Severity
  • SRG-APP-000001-DNS-000001

    <GroupDescription></GroupDescription>
    Group
  • The BIND 9.x secondary name server must limit the number of zones requested from a single master name server.

    &lt;VulnDiscussion&gt;Limiting the number of concurrent sessions reduces the risk of Denial of Service (DoS) to the DNS implementation. Name serve...
    Rule Medium Severity
  • SRG-APP-000001-DNS-000001

    <GroupDescription></GroupDescription>
    Group
  • The BIND 9.x secondary name server must limit the total number of zones the name server can request at any one time.

    &lt;VulnDiscussion&gt;Limiting the number of concurrent sessions reduces the risk of Denial of Service (DoS) to the DNS implementation. Name serve...
    Rule Medium Severity
  • SRG-APP-000001-DNS-000115

    <GroupDescription></GroupDescription>
    Group
  • The BIND 9.x server implementation must limit the number of concurrent session client connections to the number of allowed dynamic update clients.

    &lt;VulnDiscussion&gt;Limiting the number of concurrent sessions reduces the risk of Denial of Service (DoS) to the DNS implementation. Name serv...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules