Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • In a split DNS configuration, where separate name servers are used between the external and internal networks, the external name server must be configured to not be reachable from inside resolvers.

    &lt;VulnDiscussion&gt;Instead of having the same set of authoritative name servers serve different types of clients, an enterprise could have two d...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • In a split DNS configuration, where separate name servers are used between the external and internal networks, the internal name server must be configured to not be reachable from outside resolvers.

    &lt;VulnDiscussion&gt;Instead of having the same set of authoritative name servers serve different types of clients, an enterprise could have two d...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Primary authoritative name servers must be configured to only receive zone transfer requests from specified secondary name servers.

    &lt;VulnDiscussion&gt;Authoritative name servers (especially primary name servers) should be configured with an allow-transfer access control subst...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The DNS implementation must be conformant to the IETF DNS specification.

    &lt;VulnDiscussion&gt;Any DNS implementation must be designed to be able to conform to the Internet Engineering Task Force (IETF) specification. Do...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The DNS implementation must enforce a Discretionary Access Control (DAC) policy that limits propagation of access rights.

    &lt;VulnDiscussion&gt;Discretionary Access Control (DAC) is based on the premise that individual users are "owners" of objects and therefore have d...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The DNS implementation must implement internal/external role separation.

    &lt;VulnDiscussion&gt;DNS servers with an internal role only process name/address resolution requests from within the organization (i.e., internal ...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The DNS must utilize valid root name servers in the local root zone file.

    &lt;VulnDiscussion&gt;All caching name servers must be authoritative for the root zone because, without this starting point, they would have no kno...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The DNS name server software must be at the latest version.

    &lt;VulnDiscussion&gt;Each newer version of the name server software, especially the BIND software, generally is devoid of vulnerabilities found in...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The DNS Name Server software must run with restricted privileges.

    &lt;VulnDiscussion&gt;Failure to provide logical access restrictions associated with changes to application configuration may have significant effe...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The IP address for hidden master authoritative name servers must not appear in the name servers set in the zone database.

    &lt;VulnDiscussion&gt;A hidden master authoritative server is an authoritative DNS server whose IP address does not appear in the name server set f...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The platform on which the name server software is hosted must be configured to respond to DNS traffic only.

    &lt;VulnDiscussion&gt;OS configuration practices as issued by the US Computer Emergency Response Team (US CERT) and the National Institute of Stand...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The platform on which the name server software is hosted must be configured to send outgoing DNS messages from a random port.

    &lt;VulnDiscussion&gt;OS configuration practices as issued by the US Computer Emergency Response Team (US CERT) and the National Institute of Stand...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The private key corresponding to the ZSK, stored on name servers accepting dynamic updates, must have appropriate directory/file-level access control list-based or cryptography-based protections.

    &lt;VulnDiscussion&gt;The private keys in the KSK and ZSK key pairs must be protected from unauthorized access. If possible, the private keys shoul...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The private keys corresponding to both the ZSK and the KSK must not be kept on the DNSSEC-aware primary authoritative name server when the name server does not support dynamic updates.

    &lt;VulnDiscussion&gt;The private keys in the KSK and ZSK key pairs must be protected from unauthorized access. If possible, the private keys shoul...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • A zone file must not include resource records that resolve to a fully qualified domain name residing in another zone.

    &lt;VulnDiscussion&gt;If a name server were able to claim authority for a resource record in a domain for which it was not authoritative, this woul...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • CNAME records must not point to a zone with lesser security for more than six months.

    &lt;VulnDiscussion&gt;The use of CNAME records for exercises, tests, or zone-spanning aliases should be temporary (e.g., to facilitate a migration)...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.

    &lt;VulnDiscussion&gt;Configuration settings are the set of parameters that can be changed that affect the security posture and/or functionality of...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • A unique TSIG key must be generated for each pair of communicating hosts.

    &lt;VulnDiscussion&gt;To enable zone transfer (requests and responses) through authenticated messages, it is necessary to generate a key for every ...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • All authoritative name servers for a zone must be geographically disbursed.

    &lt;VulnDiscussion&gt;In addition to network-based dispersion, authoritative name servers should be dispersed geographically as well. In other word...
    Rule Medium Severity
  • SRG-APP-000700

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must disable accounts when the accounts have expired.

    &lt;VulnDiscussion&gt;Disabling expired, inactive, or otherwise anomalous accounts supports the concepts of least privilege and least functionality...
    Rule Medium Severity
  • SRG-APP-000705

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must disable accounts when the accounts are no longer associated to a user.

    &lt;VulnDiscussion&gt;Disabling expired, inactive, or otherwise anomalous accounts supports the concepts of least privilege and least functionality...
    Rule Medium Severity
  • SRG-APP-000745

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must implement the capability to centrally review and analyze audit records from multiple components within the system.

    &lt;VulnDiscussion&gt;Automated mechanisms for centralized reviews and analyses include Security Information and Event Management products.&lt;/Vul...
    Rule Medium Severity
  • SRG-APP-000795

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information.

    &lt;VulnDiscussion&gt;Audit information includes all information needed to successfully audit system activity, such as audit records, audit log set...
    Rule Medium Severity
  • SRG-APP-000805

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must automatically generate audit records of the enforcement actions.

    &lt;VulnDiscussion&gt;Organizations log system accesses associated with applying configuration changes to ensure that configuration change control ...
    Rule Medium Severity
  • SRG-APP-000810

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must prevent the installation of organization-defined software and firmware components without verification that the component has been digitally signed using a certificate that is recognized and approved by the organization.

    &lt;VulnDiscussion&gt;Software and firmware components prevented from installation unless signed with recognized and approved certificates include ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules