Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000001

    <GroupDescription></GroupDescription>
    Group
  • The DNS implementation must limit the number of concurrent sessions client connections to the number of allowed dynamic update clients.

    &lt;VulnDiscussion&gt;Limiting the number of concurrent sessions reduces the risk of Denial of Service (DoS) to the DNS implementation. Name serv...
    Rule Medium Severity
  • SRG-APP-000089

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must be configured to provide audit record generation capability for DoD-defined auditable events within all DNS server components.

    &lt;VulnDiscussion&gt;Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events r...
    Rule Medium Severity
  • SRG-APP-000089

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must be configured to provide audit record generation capability for DoD-defined auditable events within all DNS server components.

    &lt;VulnDiscussion&gt;Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events r...
    Rule Medium Severity
  • SRG-APP-000095

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must produce audit records containing information to establish what type of events occurred.

    &lt;VulnDiscussion&gt;Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is ...
    Rule Medium Severity
  • SRG-APP-000096

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must produce audit records containing information to establish when (date and time) the events occurred.

    &lt;VulnDiscussion&gt;Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events relating to a...
    Rule Medium Severity
  • SRG-APP-000097

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must produce audit records containing information to establish where the events occurred.

    &lt;VulnDiscussion&gt;Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events relating to ...
    Rule Medium Severity
  • SRG-APP-000098

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must produce audit records containing information to establish the source of the events.

    &lt;VulnDiscussion&gt;Without establishing the source of the event, it is impossible to establish, correlate, and investigate the events leading up...
    Rule Medium Severity
  • SRG-APP-000099

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must produce audit records that contain information to establish the outcome of the events.

    &lt;VulnDiscussion&gt;Without information about the outcome of events, security personnel cannot make an accurate assessment about whether an attac...
    Rule Medium Severity
  • SRG-APP-000100

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must generate audit records containing information that establishes the identity of any individual or process associated with the event.

    &lt;VulnDiscussion&gt;Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associ...
    Rule Medium Severity
  • SRG-APP-000125

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementations audit records must be backed up at least every seven days onto a different system or system component than the system or component being audited.

    &lt;VulnDiscussion&gt;Protection of log data includes assuring log data is not accidentally lost or deleted. Backing up audit records to a differen...
    Rule Medium Severity
  • SRG-APP-000142

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must be configured to prohibit or restrict unapproved ports and protocols.

    &lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule Medium Severity
  • SRG-APP-000158

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must uniquely identify the other DNS server before responding to a server-to-server transaction.

    &lt;VulnDiscussion&gt;Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. This...
    Rule Medium Severity
  • SRG-APP-000176

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation, when using PKI-based authentication, must enforce authorized access to the corresponding private key.

    &lt;VulnDiscussion&gt;The cornerstone of the PKI is the private key used to encrypt or digitally sign information. If the private key is stolen, th...
    Rule Medium Severity
  • SRG-APP-000176

    <GroupDescription></GroupDescription>
    Group
  • The key file must be owned by the account under which the name server software is run.

    &lt;VulnDiscussion&gt;To enable zone transfer (requests and responses) through authenticated messages, it is necessary to generate a key for every ...
    Rule Medium Severity
  • SRG-APP-000176

    <GroupDescription></GroupDescription>
    Group
  • Read/Write access to the key file must be restricted to the account that runs the name server software only.

    &lt;VulnDiscussion&gt;To enable zone transfer (requests and responses) through authenticated messages, it is necessary to generate a key for every ...
    Rule Medium Severity
  • SRG-APP-000176

    <GroupDescription></GroupDescription>
    Group
  • Only the private key corresponding to the ZSK alone must be kept on the name server that does support dynamic updates.

    &lt;VulnDiscussion&gt;The private keys in the KSK and ZSK key pairs must be protected from unauthorized access. If possible, the private keys shoul...
    Rule Medium Severity
  • SRG-APP-000176

    <GroupDescription></GroupDescription>
    Group
  • Signature generation using the KSK must be done off-line, using the KSK-private stored off-line.

    &lt;VulnDiscussion&gt;Security-relevant information is any information within information systems that can potentially impact the operation of secu...
    Rule Medium Severity
  • SRG-APP-000185

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.

    &lt;VulnDiscussion&gt;If maintenance tools are used by unauthorized personnel, they may accidentally or intentionally damage or compromise the syst...
    Rule Medium Severity
  • SRG-APP-000213

    <GroupDescription></GroupDescription>
    Group
  • A DNS server implementation must provide additional data origin artifacts along with the authoritative data the system returns in response to external name/address resolution queries.

    &lt;VulnDiscussion&gt;The underlying feature in the major threat associated with DNS query/response (i.e., forged response or response failure) is ...
    Rule Medium Severity
  • SRG-APP-000214

    <GroupDescription></GroupDescription>
    Group
  • A DNS server implementation must provide the means to indicate the security status of child zones.

    &lt;VulnDiscussion&gt;If name server replies are invalid or cannot be validated, many networking functions and communication would be adversely aff...
    Rule Medium Severity
  • SRG-APP-000214

    <GroupDescription></GroupDescription>
    Group
  • The validity period for the RRSIGs covering the DS RR for a zones delegated children must be no less than two days and no more than one week.

    &lt;VulnDiscussion&gt;The best way for a zone administrator to minimize the impact of a key compromise is by limiting the validity period of RRSIGs...
    Rule Medium Severity
  • SRG-APP-000215

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must enforce approved authorizations for controlling the flow of information between DNS servers and between DNS servers and DNS clients based on DNSSEC policies.

    &lt;VulnDiscussion&gt;A mechanism to detect and prevent unauthorized communication flow must be configured or provided as part of the system design...
    Rule Medium Severity
  • SRG-APP-000215

    <GroupDescription></GroupDescription>
    Group
  • A DNS server implementation must provide the means to enable verification of a chain of trust among parent and child domains (if the child supports secure resolution services).

    &lt;VulnDiscussion&gt;If name server replies are invalid or cannot be validated, many networking functions and communication would be adversely aff...
    Rule Medium Severity
  • SRG-APP-000219

    <GroupDescription></GroupDescription>
    Group
  • The DNS implementation must protect the authenticity of communications sessions for zone transfers.

    &lt;VulnDiscussion&gt;DNS is a fundamental network service that is prone to various attacks, such as cache poisoning and man-in-the middle attacks....
    Rule Medium Severity
  • SRG-APP-000219

    <GroupDescription></GroupDescription>
    Group
  • The DNS implementation must protect the authenticity of communications sessions for dynamic updates.

    &lt;VulnDiscussion&gt;DNS is a fundamental network service that is prone to various attacks, such as cache poisoning and man-in-the middle attacks....
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules