Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000243

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must prevent unauthorized and unintended information transfer via shared system resources.

    &lt;VulnDiscussion&gt;Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of infor...
    Rule Medium Severity
  • SRG-APP-000246

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must restrict the ability of individuals to use the DNS server to launch Denial of Service (DoS) attacks against other information systems.

    &lt;VulnDiscussion&gt;A DoS is a condition where a resource is not available for legitimate users. When this occurs, the organization either cannot...
    Rule Medium Severity
  • SRG-APP-000247

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of Denial of Service (DoS) attacks.

    &lt;VulnDiscussion&gt;A DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ...
    Rule Medium Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must check the validity of all data inputs except those specifically identified by the organization.

    &lt;VulnDiscussion&gt;Invalid user input occurs when a user inserts data or characters into an application's data entry fields and the application ...
    Rule Medium Severity
  • SRG-APP-000268

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must, when a component failure is detected, activate a notification to the system administrator.

    &lt;VulnDiscussion&gt;Predictable failure prevention requires organizational planning to address system failure issues. If components key to mainta...
    Rule Medium Severity
  • SRG-APP-000275

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must be configured to generate audit records for failed security verification tests so that the ISSO and ISSM can be notified of the failures.

    &lt;VulnDiscussion&gt;Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing t...
    Rule Medium Severity
  • SRG-APP-000347

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must strongly bind the identity of the DNS server with the DNS information.

    &lt;VulnDiscussion&gt;Weakly bound credentials can be modified without invalidating the credential; therefore, non-repudiation can be violated. Th...
    Rule Medium Severity
  • SRG-APP-000348

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must provide the means for authorized individuals to determine the identity of the source of the DNS server-provided information.

    &lt;VulnDiscussion&gt;Without a means for identifying the individual that produced the information, the information cannot be relied upon. Identify...
    Rule Medium Severity
  • SRG-APP-000349

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must validate the binding of the other DNS servers identity to the DNS information for a server-to-server transaction (e.g., zone transfer).

    &lt;VulnDiscussion&gt;Validation of the binding of the information prevents the modification of information between production and review. The vali...
    Rule Medium Severity
  • SRG-APP-000350

    <GroupDescription></GroupDescription>
    Group
  • In the event of an error when validating the binding of another DNS servers identity to the DNS information, the DNS server implementation must log the event and send notification to the DNS administrator.

    &lt;VulnDiscussion&gt;Failing to act on the validation errors may result in the use of invalid, corrupted, or compromised information. The validati...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules