III - Administrative Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000383-DNS-000047
<GroupDescription></GroupDescription>Group -
The F5 BIG-IP DNS implementation must prohibit recursion on authoritative name servers.
<VulnDiscussion>A potential vulnerability of DNS is that an attacker can poison a name server's cache by sending queries that will cause the ...Rule Medium Severity -
SRG-APP-000516-DNS-000078
<GroupDescription></GroupDescription>Group -
The validity period for the RRSIGs covering a zone's DNSKEY RRSet must be no less than two days and no more than one week.
<VulnDiscussion>The best way for a zone administrator to minimize the impact of a key compromise is by limiting the validity period of RRSIGs...Rule Medium Severity -
SRG-APP-000516-DNS-000089
<GroupDescription></GroupDescription>Group -
An authoritative name server must be configured to enable DNSSEC Resource Records.
<VulnDiscussion>The specification for a digital signature mechanism in the context of the DNS infrastructure is in IETF's DNSSEC standard. In...Rule Medium Severity -
SRG-APP-000516-DNS-000095
<GroupDescription></GroupDescription>Group -
Primary authoritative name servers must be configured to only receive zone transfer requests from specified secondary name servers.
<VulnDiscussion>Authoritative name servers (especially primary name servers) must be configured with an allow-transfer access control substat...Rule Medium Severity -
SRG-APP-000516-DNS-000102
<GroupDescription></GroupDescription>Group -
The F5 BIG-IP DNS must use valid root name servers in the local root zone file.
<VulnDiscussion>All caching name servers must be authoritative for the root zone because, without this starting point, they would have no kno...Rule Medium Severity -
SRG-APP-000516-DNS-000109
<GroupDescription></GroupDescription>Group -
The platform on which the name server software is hosted must be configured to respond to DNS traffic only.
<VulnDiscussion>Hosts that run the name server software must not provide any other services and therefore must be configured to respond to DN...Rule Medium Severity -
SRG-APP-000516-DNS-000090
<GroupDescription></GroupDescription>Group -
The digital signature algorithm used for DNSSEC-enabled zones must be set to use RSA/SHA256 or RSA/SHA512.
<VulnDiscussion>The choice of digital signature algorithm will be based on recommended algorithms in well-known standards. NIST's Digital Sig...Rule High Severity -
SRG-APP-000349-DNS-000043
<GroupDescription></GroupDescription>Group -
The F5 BIG-IP DNS server implementation must validate the binding of the other DNS server's identity to the DNS information for a server-to-server transaction (e.g., zone transfer).
<VulnDiscussion>Validation of the binding of the information prevents the modification of information between production and review. The vali...Rule Medium Severity -
SRG-APP-000213-DNS-000024
<GroupDescription></GroupDescription>Group -
A BIG-IP DNS server implementation must provide additional data origin artifacts along with the authoritative data the system returns in response to external name/address resolution queries.
<VulnDiscussion>The underlying feature in the major threat associated with DNS query/response (e.g., forged response or response failure) is ...Rule Medium Severity -
SRG-APP-000214-DNS-000079
<GroupDescription></GroupDescription>Group -
The validity period for the RRSIGs covering the DS RR for a zones delegated children must be no less than two days and no more than one week.
<VulnDiscussion>The best way for a zone administrator to minimize the impact of a key compromise is by limiting the validity period of RRSIGs...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.