I - Mission Critical Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
CNAME records must not point to a zone with lesser security for more than six months.
<VulnDiscussion>The use of CNAME records for exercises, tests, or zone-spanning aliases should be temporary (e.g., to facilitate a migration)...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The DNS server implementation must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
<VulnDiscussion>Configuration settings are the set of parameters that can be changed that affect the security posture and/or functionality of...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
A unique TSIG key must be generated for each pair of communicating hosts.
<VulnDiscussion>To enable zone transfer (requests and responses) through authenticated messages, it is necessary to generate a key for every ...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
All authoritative name servers for a zone must be geographically disbursed.
<VulnDiscussion>In addition to network-based dispersion, authoritative name servers should be dispersed geographically as well. In other word...Rule Medium Severity -
SRG-APP-000700
<GroupDescription></GroupDescription>Group -
The DNS server implementation must disable accounts when the accounts have expired.
<VulnDiscussion>Disabling expired, inactive, or otherwise anomalous accounts supports the concepts of least privilege and least functionality...Rule Medium Severity -
SRG-APP-000705
<GroupDescription></GroupDescription>Group -
The DNS server implementation must disable accounts when the accounts are no longer associated to a user.
<VulnDiscussion>Disabling expired, inactive, or otherwise anomalous accounts supports the concepts of least privilege and least functionality...Rule Medium Severity -
SRG-APP-000745
<GroupDescription></GroupDescription>Group -
The DNS server implementation must implement the capability to centrally review and analyze audit records from multiple components within the system.
<VulnDiscussion>Automated mechanisms for centralized reviews and analyses include Security Information and Event Management products.</Vul...Rule Medium Severity -
SRG-APP-000795
<GroupDescription></GroupDescription>Group -
The DNS server implementation must alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information.
<VulnDiscussion>Audit information includes all information needed to successfully audit system activity, such as audit records, audit log set...Rule Medium Severity -
SRG-APP-000805
<GroupDescription></GroupDescription>Group -
The DNS server implementation must automatically generate audit records of the enforcement actions.
<VulnDiscussion>Organizations log system accesses associated with applying configuration changes to ensure that configuration change control ...Rule Medium Severity -
SRG-APP-000810
<GroupDescription></GroupDescription>Group -
The DNS server implementation must prevent the installation of organization-defined software and firmware components without verification that the component has been digitally signed using a certificate that is recognized and approved by the organization.
<VulnDiscussion>Software and firmware components prevented from installation unless signed with recognized and approved certificates include ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.