I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000348-DNS-000042
<GroupDescription></GroupDescription>Group -
The Windows DNS Server must be configured to record who added/modified/deleted DNS zone information.
<VulnDiscussion>Without a means for identifying the individual that produced the information, the information cannot be relied on. Identifyin...Rule Medium Severity -
SRG-APP-000350-DNS-000044
<GroupDescription></GroupDescription>Group -
The Windows DNS Server must notify the DNS administrator in the event of an error validating another DNS server's identity.
<VulnDiscussion>Failing to act on validation errors may result in the use of invalid, corrupted, or compromised information. The validation o...Rule Medium Severity -
SRG-APP-000089-DNS-000004
<GroupDescription></GroupDescription>Group -
The Windows DNS Server log must be enabled.
<VulnDiscussion>Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events r...Rule Medium Severity -
SRG-APP-000516-DNS-000500
<GroupDescription></GroupDescription>Group -
The "Manage auditing and security log" user right must be assigned only to authorized personnel.
<VulnDiscussion>Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events r...Rule Medium Severity -
SRG-APP-000214-DNS-000079
<GroupDescription></GroupDescription>Group -
The validity period for the Resource Record Signatures (RRSIGs) covering the Delegation Signer (DS) Resource Record (RR) for a zone's delegated children must be no less than two days and no more than one week.
<VulnDiscussion>The best way for a zone administrator to minimize the impact of a key compromise is by limiting the validity period of RRSIGs...Rule Medium Severity -
SRG-APP-000218-DNS-000027
<GroupDescription></GroupDescription>Group -
The Windows DNS name servers for a zone must be geographically dispersed.
<VulnDiscussion>In addition to network-based separation, authoritative name servers should be dispersed geographically. In other words, in ad...Rule Medium Severity -
SRG-APP-000383-DNS-000047
<GroupDescription></GroupDescription>Group -
The Windows DNS Server must prohibit recursion on authoritative name servers for which forwarders have not been configured for external queries.
<VulnDiscussion>A potential vulnerability of DNS is that an attacker can poison a name server's cache by sending queries that will cause the ...Rule Medium Severity -
SRG-APP-000383-DNS-000047
<GroupDescription></GroupDescription>Group -
Forwarders on an authoritative Windows DNS Server, if enabled for external resolution, must forward only to an internal, non-Active Directory (AD)-integrated DNS server or to the DOD Enterprise Recursive Services (ERS).
<VulnDiscussion>A potential vulnerability of DNS is that an attacker can poison a name server's cache by sending queries that will cause the ...Rule Medium Severity -
SRG-APP-000383-DNS-000047
<GroupDescription></GroupDescription>Group -
The Windows DNS Server with a caching name server role must restrict recursive query responses to only the IP addresses and IP address ranges of known supported clients.
<VulnDiscussion>A potential vulnerability of DNS is that an attacker can poison a name server's cache by sending queries that will cause the ...Rule High Severity -
SRG-APP-000440-DNS-000065
<GroupDescription></GroupDescription>Group -
The Windows DNS Server must implement cryptographic mechanisms to detect changes to information during transmission.
<VulnDiscussion>Encrypting information for transmission protects it from unauthorized disclosure and modification. Cryptographic mechanisms i...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.