Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000214

    <GroupDescription></GroupDescription>
    Group
  • A DNS server implementation must provide the means to indicate the security status of child zones.

    &lt;VulnDiscussion&gt;If name server replies are invalid or cannot be validated, many networking functions and communication would be adversely aff...
    Rule Medium Severity
  • SRG-APP-000214

    <GroupDescription></GroupDescription>
    Group
  • The validity period for the RRSIGs covering the DS RR for a zones delegated children must be no less than two days and no more than one week.

    &lt;VulnDiscussion&gt;The best way for a zone administrator to minimize the impact of a key compromise is by limiting the validity period of RRSIGs...
    Rule Medium Severity
  • SRG-APP-000215

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must enforce approved authorizations for controlling the flow of information between DNS servers and between DNS servers and DNS clients based on DNSSEC policies.

    &lt;VulnDiscussion&gt;A mechanism to detect and prevent unauthorized communication flow must be configured or provided as part of the system design...
    Rule Medium Severity
  • SRG-APP-000215

    <GroupDescription></GroupDescription>
    Group
  • A DNS server implementation must provide the means to enable verification of a chain of trust among parent and child domains (if the child supports secure resolution services).

    &lt;VulnDiscussion&gt;If name server replies are invalid or cannot be validated, many networking functions and communication would be adversely aff...
    Rule Medium Severity
  • SRG-APP-000219

    <GroupDescription></GroupDescription>
    Group
  • The DNS implementation must protect the authenticity of communications sessions for zone transfers.

    &lt;VulnDiscussion&gt;DNS is a fundamental network service that is prone to various attacks, such as cache poisoning and man-in-the middle attacks....
    Rule Medium Severity
  • SRG-APP-000219

    <GroupDescription></GroupDescription>
    Group
  • The DNS implementation must protect the authenticity of communications sessions for dynamic updates.

    &lt;VulnDiscussion&gt;DNS is a fundamental network service that is prone to various attacks, such as cache poisoning and man-in-the middle attacks....
    Rule Medium Severity
  • SRG-APP-000219

    <GroupDescription></GroupDescription>
    Group
  • The DNS implementation must protect the authenticity of communications sessions for queries.

    &lt;VulnDiscussion&gt;The underlying feature in the major threat associated with DNS query/response (i.e., forged response or response failure) is ...
    Rule Medium Severity
  • SRG-APP-000225

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must fail to a secure state if system initialization fails, shutdown fails, or aborts fail.

    &lt;VulnDiscussion&gt;Failure to a known safe state helps prevent systems from failing to a state that may cause loss of data or unauthorized acces...
    Rule Medium Severity
  • SRG-APP-000226

    <GroupDescription></GroupDescription>
    Group
  • In the event of a system failure, the DNS server implementation must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes.

    &lt;VulnDiscussion&gt;Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Fa...
    Rule Medium Severity
  • SRG-APP-000231

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must protect the confidentiality and integrity of secret/private cryptographic keys at rest and the integrity of DNS information at rest.

    &lt;VulnDiscussion&gt;Information at rest refers to the state of information when it is located on a secondary storage device within an organizatio...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules