Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000246

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must restrict the ability of individuals to use the DNS server to launch Denial of Service (DoS) attacks against other information systems.

    &lt;VulnDiscussion&gt;A DoS is a condition where a resource is not available for legitimate users. When this occurs, the organization either cannot...
    Rule Medium Severity
  • SRG-APP-000247

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of Denial of Service (DoS) attacks.

    &lt;VulnDiscussion&gt;A DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ...
    Rule Medium Severity
  • SRG-APP-000251

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must check the validity of all data inputs except those specifically identified by the organization.

    &lt;VulnDiscussion&gt;Invalid user input occurs when a user inserts data or characters into an application's data entry fields and the application ...
    Rule Medium Severity
  • SRG-APP-000268

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must, when a component failure is detected, activate a notification to the system administrator.

    &lt;VulnDiscussion&gt;Predictable failure prevention requires organizational planning to address system failure issues. If components key to mainta...
    Rule Medium Severity
  • SRG-APP-000275

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must be configured to generate audit records for failed security verification tests so that the ISSO and ISSM can be notified of the failures.

    &lt;VulnDiscussion&gt;Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing t...
    Rule Medium Severity
  • SRG-APP-000333

    <GroupDescription></GroupDescription>
    Group
  • The DNS Name Server software must be configured to refuse queries for its version information.

    &lt;VulnDiscussion&gt;Each newer version of the name server software, especially the BIND software, generally is devoid of vulnerabilities found in...
    Rule Medium Severity
  • SRG-APP-000333

    <GroupDescription></GroupDescription>
    Group
  • The HINFO, RP, TXT and LOC RR types must not be used in the zone SOA.

    &lt;VulnDiscussion&gt;There are several types of RRs in the DNS that are meant to convey information to humans and applications about the network, ...
    Rule Medium Severity
  • SRG-APP-000347

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must strongly bind the identity of the DNS server with the DNS information.

    &lt;VulnDiscussion&gt;Weakly bound credentials can be modified without invalidating the credential; therefore, non-repudiation can be violated. Th...
    Rule Medium Severity
  • SRG-APP-000348

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must provide the means for authorized individuals to determine the identity of the source of the DNS server-provided information.

    &lt;VulnDiscussion&gt;Without a means for identifying the individual that produced the information, the information cannot be relied upon. Identify...
    Rule Medium Severity
  • SRG-APP-000349

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must validate the binding of the other DNS servers identity to the DNS information for a server-to-server transaction (e.g., zone transfer).

    &lt;VulnDiscussion&gt;Validation of the binding of the information prevents the modification of information between production and review. The vali...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules