I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000142
<GroupDescription></GroupDescription>Group -
The DNS server implementation must be configured to prohibit or restrict unapproved ports and protocols.
<VulnDiscussion>In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....Rule Medium Severity -
SRG-APP-000158
<GroupDescription></GroupDescription>Group -
The DNS server implementation must uniquely identify the other DNS server before responding to a server-to-server transaction.
<VulnDiscussion>Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. This...Rule Medium Severity -
SRG-APP-000176
<GroupDescription></GroupDescription>Group -
The DNS server implementation, when using PKI-based authentication, must enforce authorized access to the corresponding private key.
<VulnDiscussion>The cornerstone of the PKI is the private key used to encrypt or digitally sign information. If the private key is stolen, th...Rule Medium Severity -
SRG-APP-000176
<GroupDescription></GroupDescription>Group -
The key file must be owned by the account under which the name server software is run.
<VulnDiscussion>To enable zone transfer (requests and responses) through authenticated messages, it is necessary to generate a key for every ...Rule Medium Severity -
SRG-APP-000176
<GroupDescription></GroupDescription>Group -
Read/Write access to the key file must be restricted to the account that runs the name server software only.
<VulnDiscussion>To enable zone transfer (requests and responses) through authenticated messages, it is necessary to generate a key for every ...Rule Medium Severity -
SRG-APP-000176
<GroupDescription></GroupDescription>Group -
Only the private key corresponding to the ZSK alone must be kept on the name server that does support dynamic updates.
<VulnDiscussion>The private keys in the KSK and ZSK key pairs must be protected from unauthorized access. If possible, the private keys shoul...Rule Medium Severity -
SRG-APP-000176
<GroupDescription></GroupDescription>Group -
Signature generation using the KSK must be done off-line, using the KSK-private stored off-line.
<VulnDiscussion>Security-relevant information is any information within information systems that can potentially impact the operation of secu...Rule Medium Severity -
SRG-APP-000185
<GroupDescription></GroupDescription>Group -
The DNS server implementation must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.
<VulnDiscussion>If maintenance tools are used by unauthorized personnel, they may accidentally or intentionally damage or compromise the syst...Rule Medium Severity -
SRG-APP-000213
<GroupDescription></GroupDescription>Group -
A DNS server implementation must provide additional data origin artifacts along with the authoritative data the system returns in response to external name/address resolution queries.
<VulnDiscussion>The underlying feature in the major threat associated with DNS query/response (i.e., forged response or response failure) is ...Rule Medium Severity -
SRG-APP-000214
<GroupDescription></GroupDescription>Group -
A DNS server implementation must provide the means to indicate the security status of child zones.
<VulnDiscussion>If name server replies are invalid or cannot be validated, many networking functions and communication would be adversely aff...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.