Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The DNS implementation must implement internal/external role separation.

    &lt;VulnDiscussion&gt;DNS servers with an internal role only process name/address resolution requests from within the organization (i.e., internal ...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The DNS must utilize valid root name servers in the local root zone file.

    &lt;VulnDiscussion&gt;All caching name servers must be authoritative for the root zone because, without this starting point, they would have no kno...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The DNS name server software must be at the latest version.

    &lt;VulnDiscussion&gt;Each newer version of the name server software, especially the BIND software, generally is devoid of vulnerabilities found in...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The DNS Name Server software must run with restricted privileges.

    &lt;VulnDiscussion&gt;Failure to provide logical access restrictions associated with changes to application configuration may have significant effe...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The IP address for hidden master authoritative name servers must not appear in the name servers set in the zone database.

    &lt;VulnDiscussion&gt;A hidden master authoritative server is an authoritative DNS server whose IP address does not appear in the name server set f...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The platform on which the name server software is hosted must be configured to respond to DNS traffic only.

    &lt;VulnDiscussion&gt;OS configuration practices as issued by the US Computer Emergency Response Team (US CERT) and the National Institute of Stand...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The platform on which the name server software is hosted must be configured to send outgoing DNS messages from a random port.

    &lt;VulnDiscussion&gt;OS configuration practices as issued by the US Computer Emergency Response Team (US CERT) and the National Institute of Stand...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The private key corresponding to the ZSK, stored on name servers accepting dynamic updates, must have appropriate directory/file-level access control list-based or cryptography-based protections.

    &lt;VulnDiscussion&gt;The private keys in the KSK and ZSK key pairs must be protected from unauthorized access. If possible, the private keys shoul...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The private keys corresponding to both the ZSK and the KSK must not be kept on the DNSSEC-aware primary authoritative name server when the name server does not support dynamic updates.

    &lt;VulnDiscussion&gt;The private keys in the KSK and ZSK key pairs must be protected from unauthorized access. If possible, the private keys shoul...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • A zone file must not include resource records that resolve to a fully qualified domain name residing in another zone.

    &lt;VulnDiscussion&gt;If a name server were able to claim authority for a resource record in a domain for which it was not authoritative, this woul...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules