Domain Name System (DNS) Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-APP-000001-DNS-000115
- Vuln IDs
-
- V-54777
- Rule IDs
-
- SV-69023r1_rule
Checks: C-55399r1_chk
Review the DNS server configuration and ensure a limit has been defined for the number of inbound dynamic update sessions by defining the finite group of hosts allowed to provide those dynamic updates. If the DNS server configuration does not explicitly specify which hosts from which it accepts dynamic updates, this is a finding.
Fix: F-59635r1_fix
Configure the DNS primary server to explicitly specify which hosts from which it accepts dynamic updates.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-APP-000089-DNS-000004
- Vuln IDs
-
- V-54781
- Rule IDs
-
- SV-69027r1_rule
Checks: C-55403r2_chk
Review the DNS server implementation configuration to determine if the DNS server is configured to generate audit events for successful and unsuccessful attempts to access, modify, or delete privileges, security objects, security levels, or categories of information (e.g., classification levels) events within all DNS server components. If the DNS server is not configured to generate audit events for successful and unsuccessful attempts to access, modify, or delete privileges, security objects, security levels, or categories of information (e.g., classification levels) events within all DNS server components, this is a finding.
Fix: F-59639r2_fix
Configure the DNS server to generate events for successful and unsuccessful attempts to access, modify, or delete privileges, security objects, security levels, or categories of information (e.g., classification levels) events within all DNS server components.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-APP-000089-DNS-000005
- Vuln IDs
-
- V-54783
- Rule IDs
-
- SV-69029r1_rule
Checks: C-55405r2_chk
Review the DNS server implementation configuration to determine if the DNS server is configured to generate audit events for successful and unsuccessful logon attempts, privileged activities and system-level access. If the DNS server is not configured to generate audit events for successful and unsuccessful logon attempts, privileged activities and system-level access, this is a finding.
Fix: F-59641r2_fix
Configure the DNS server to generate audit events for successful and unsuccessful logon attempts, privileged activities and system-level access within all DNS server components.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-APP-000095-DNS-000006
- Vuln IDs
-
- V-54785
- Rule IDs
-
- SV-69031r1_rule
Checks: C-55407r2_chk
Review the DNS system configuration to determine if it is configured to log sufficient information to establish what type of events has occurred on the system. If the logging function is not configured to produce log records with information regarding the type of event, this is a finding.
Fix: F-59643r2_fix
Configure the DNS server to log events with enough information to determine what type of event has occurred on the system.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-APP-000097-DNS-000008
- Vuln IDs
-
- V-54787
- Rule IDs
-
- SV-69033r1_rule
Checks: C-55409r1_chk
Review the DNS system configuration to determine if it is configured to produce, capture and store log records which contain information to establish where events have occurred on the system. If the logging function is not configured to produce log records with information regarding where the event took place, this is a finding.
Fix: F-59645r1_fix
Configure the DNS server to produce log records that contain information that establishes where events have occurred. Additionally, configure the audit facility of the DNS system to provide information where events have occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-APP-000098-DNS-000009
- Vuln IDs
-
- V-54789
- Rule IDs
-
- SV-69035r1_rule
Checks: C-55411r1_chk
Review the DNS server configuration to determine if the source of the events is a configurable option within the audit/logging utility and if it is being captured and stored. If the DNS is not configured to capture and store the source of an event, this is a finding.
Fix: F-59647r1_fix
Configure the DNS server to produce log records which indicate the source of the events. Additionally, configure the audit facility of the DNS system to provide information to establish the source of events.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-APP-000099-DNS-000010
- Vuln IDs
-
- V-54791
- Rule IDs
-
- SV-69037r1_rule
Checks: C-55413r1_chk
Review the DNS server configuration to determine if it is configured to produce, capture, and store log records which contain information about success and failure of events on the system. If the logging function is not configured to produce log records with information regarding success and failure of events, this is a finding.
Fix: F-59649r1_fix
Configure the DNS server to produce log records that contain information about success and failure of events on the system. Additionally, configure the audit facility of the DNS system to provide information to establish the success or failure of the event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-APP-000100-DNS-000011
- Vuln IDs
-
- V-54793
- Rule IDs
-
- SV-69039r1_rule
Checks: C-55415r1_chk
Review the DNS system configuration to determine if audit records exist without specific user information, when user information is available. If audit records exist without specific user information when user information is available, this is a finding.
Fix: F-59651r1_fix
Configure the DNS system audit settings to log specific user information whenever user information is available.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- SRG-APP-000125-DNS-000012
- Vuln IDs
-
- V-54795
- Rule IDs
-
- SV-69041r1_rule
Checks: C-55417r1_chk
Review the DNS system configuration to determine if audit record content is sent to a centralized audit log repository, either directly by the DNS system or by the underlying O/S. If the DNS system is not configured to support centralized logging and auditing, this is a finding.
Fix: F-59653r1_fix
Configure the DNS server or the underlying O/S to send audit log content to a centralized logging facility.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-APP-000142-DNS-000014
- Vuln IDs
-
- V-54797
- Rule IDs
-
- SV-69043r1_rule
Checks: C-55419r1_chk
Review the DNS system configuration to ensure the system is configured for incoming traffic only on UDP/53 and TCP/53 and outgoing DNS traffic sent from a random port rather than the DNS software's default port. If the DNS implementation is not configured for incoming traffic on UDP/53 and TCP/53 and outgoing traffic sent from a random port rather than the DNS software's default port, this is a finding.
Fix: F-59655r1_fix
Configure the DNS implementation for incoming traffic on UDP/53 and TCP/53 and outgoing traffic sent from a random port rather than the DNS software's default port.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-000778
- Version
- SRG-APP-000158-DNS-000015
- Vuln IDs
-
- V-54799
- Rule IDs
-
- SV-69045r1_rule
Checks: C-55421r3_chk
Review the DNS server implementation configuration to determine if it validates other DNS servers' unique identify, through the use TSIG or SIG(0), when accepting server-to-server (zone transfer) transactions from the other DNS servers. If the DNS server does not validate other DNS servers' unique identity, through the use of either TSIG or SIG(0), when accepting server-to-server (zone transfer) transactions from those other DNS servers, this is a finding.
Fix: F-59657r4_fix
Configure the DNS server to verify another DNS server's unique identify, through the use of TSIG or SIG(0), when accepting server-to-server (zone transfer) transactions from other DNS servers.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-APP-000176-DNS-000017
- Vuln IDs
-
- V-54801
- Rule IDs
-
- SV-69047r1_rule
Checks: C-55423r1_chk
Review the DNS server implementation configuration to determine if the DNS server, when using PKI-based authentication (e.g., SIG(0)), enforces authorized access to the corresponding private key. If the DNS server does not enforce authorized access to the private key, this is a finding.
Fix: F-59659r1_fix
Configure the DNS server to enforce authorized access to the corresponding private key when using PKI-based authentication.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-APP-000176-DNS-000018
- Vuln IDs
-
- V-54803
- Rule IDs
-
- SV-69049r1_rule
Checks: C-55425r2_chk
Review the DNS system to determine ownership of the key file and the account under which the name server software is run. If the key file owner is not the same account as the account under which the name server is run, this is a finding.
Fix: F-59661r1_fix
Change ownership for the key file to the account under which the name server software is run.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-APP-000176-DNS-000019
- Vuln IDs
-
- V-54805
- Rule IDs
-
- SV-69051r1_rule
Checks: C-55427r2_chk
Review the DNS system to determine privileges on the key file and the account under which the name server software is run. If the account under which the name server software is run is not the only account which has read/modify permissions to the key file, this is a finding.
Fix: F-59663r1_fix
Apply permissions to the key file to provide read/modify permissions only to the account under which the name server software is run.
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-001339
- Version
- SRG-APP-000176-DNS-000076
- Vuln IDs
-
- V-54807
- Rule IDs
-
- SV-69053r1_rule
Checks: C-55429r1_chk
Review the DNS implementation. Verify that each pair of communicating hosts has a unique TSIG key (i.e., a separate key for each secondary name server to authenticate transactions with the primary name server, etc.) If a unique TSIG key has not been generated for each pair of communicating hosts, this is a finding.
Fix: F-59665r1_fix
Regenerate a unique TSIG key for each pair of communicating hosts within the DNS architecture.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-APP-000176-DNS-000094
- Vuln IDs
-
- V-54809
- Rule IDs
-
- SV-69055r1_rule
Checks: C-55431r1_chk
Review the DNS name server and documentation to determine whether it accepts dynamic updates. If dynamic updates are accepted, verify only the private keys corresponding to the ZSK (Zone Signing Key) are located on the server. If the private keys to the KSK are located on the name server that accepts dynamic updates, this is a finding.
Fix: F-59667r1_fix
Store the private keys of the ZSK and KSK off-line in an encrypted file system.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-APP-000176-DNS-000096
- Vuln IDs
-
- V-54811
- Rule IDs
-
- SV-69057r1_rule
Checks: C-55433r1_chk
Verify the DNS operational procedures and confirm procedures exist to enforce generating signatures using the KSK are performed off-line, using the KSK-private stored off-line or the secure, protected module. If the procedures do not exist or the procedures do not specify to perform the signature generation off-line from the name server, this is a finding.
Fix: F-59669r1_fix
Create operation documentation to include the safe management of keys and key storage within the DNS implementation. Include in the documentation steps to ensure signature generation using the KSK are done off-line, using the KSK-private stored off-line or the secure, protected module.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-000877
- Version
- SRG-APP-000185-DNS-000021
- Vuln IDs
-
- V-54813
- Rule IDs
-
- SV-69059r1_rule
Checks: C-55435r1_chk
Review the DNS implementation's authentication methods and settings to determine if multifactor authentication is utilized to gain nonlocal access for maintenance and diagnostics. If multifactor authentication is not utilized, this is a finding.
Fix: F-59671r1_fix
Configure the DNS system to utilize multifactor authentication for nonlocal access for maintenance and diagnostics.
- RMF Control
- SC-20
- Severity
- M
- CCI
- CCI-001178
- Version
- SRG-APP-000213-DNS-000024
- Vuln IDs
-
- V-54815
- Rule IDs
-
- SV-69061r1_rule
Checks: C-55437r5_chk
Review the zones hosted by the DNS server. Verify each of the zones have been digitally signed. To determine if the zones have been digitally signed, verify the existence of an RRSET for each zone, which will include, at a minimum, an RRType RRSIG (Resource Record Signature) as well as an RRType DNSKEY and RRType NSEC (Next Secure). If the DNS server's zones do not contain these additional RRs along with the regular RRs, this is a finding.
Fix: F-59673r4_fix
Generate an RRSET for each zone hosted by the DNS server to include an RRSIG, DNSKEY and NSEC for each zone.
- RMF Control
- SC-20
- Severity
- M
- CCI
- CCI-001179
- Version
- SRG-APP-000214-DNS-000025
- Vuln IDs
-
- V-54817
- Rule IDs
-
- SV-69063r1_rule
Checks: C-55439r4_chk
Review the zones hosted by the DNS server. Every zone should have an RRSET which includes the RRTypes of RRSIG, DNSKEY and NSEC. If a zone has a child, the RRSET should also include the RRType DS (Delegation Signer) RR, which contain the (hash) public key of child zones. If the zones hosted by the DNS server do not have any child domains, this is not a finding. If the zones hosted by the DNS server have child domains, and there is not an RRType DS RR in the zone's RRSET, this is a finding.
Fix: F-59675r4_fix
Configure each child zone to upload its DS RRset to the parent zone.
- RMF Control
- SC-20
- Severity
- M
- CCI
- CCI-001179
- Version
- SRG-APP-000214-DNS-000079
- Vuln IDs
-
- V-54819
- Rule IDs
-
- SV-69065r1_rule
Checks: C-55441r1_chk
Review the DNS configuration files. Ensure the validity period for RRSIGs for all zones' delegated children has been explicitly configured and is configured for a range of no less than two days and no more than one week. If the validity period for the RRSIGs for all zones' delegated children is less than two days or greater than one week, this is a finding.
Fix: F-59677r1_fix
Configure RRSIGs for all zones' delegated children to be greater than two days and less than one week.
- RMF Control
- SC-20
- Severity
- M
- CCI
- CCI-001663
- Version
- SRG-APP-000215-DNS-000003
- Vuln IDs
-
- V-54821
- Rule IDs
-
- SV-69067r1_rule
Checks: C-55443r3_chk
Review the DNS server implementation configuration to determine if the DNS server enforces approved authorizations for controlling the information flow by using DNSSEC and TSIG signing practices that restrict zone transfers between DNS servers, and dynamic updates from DNS clients to the master name server, to digitally signed traffic. If the DNS server does not enforce approved authorizations for controlling the information flow by using DNSSEC and TSIG signing practices, restricting zone transfers between DNS servers and dynamic updates from DNS clients to the master name server to digitally signed traffic, this is a finding.
Fix: F-59679r2_fix
Configure the DNS server to enforce approved authorizations for controlling the information flow by applying DNSSEC and TSIG signing practices to the DNS implementation.
- RMF Control
- SC-20
- Severity
- M
- CCI
- CCI-001663
- Version
- SRG-APP-000215-DNS-000026
- Vuln IDs
-
- V-54823
- Rule IDs
-
- SV-69069r1_rule
Checks: C-55445r3_chk
If the system being reviewed is an authoritative server, it must be able to provide records that can be authenticated (DS, RRSIG, etc.). Compare the child zone's hash stored in the child's DS RR to the hash for the child's zone in the parent's zone information. Verify it is the same hash. If the hashes do not match, or the child zone is not digitally signed, this is a finding. If the system is a recursive server, it must be able to pass DNSSEC data and perform DNSSEC validation. If DNSSEC validation capability is not enabled on a recursive DNS server, this is a finding. If the hash for child domains is not reflected in the parent zone and the chain of trust is not verifiable, this is a finding.
Fix: F-59681r1_fix
Configure a recursive, caching only server with the ability to perform DNSSEC validation. Configure an authoritative name server to sign all zones and to update the entire chain of trust with the signature.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- SRG-APP-000219-DNS-000028
- Vuln IDs
-
- V-54825
- Rule IDs
-
- SV-69071r1_rule
Checks: C-55447r2_chk
Review the DNS server implementation to confirm zone transfers are signing using transaction signing (TSIG) shared key or via SIG(0) asymmetric cryptography public keys. If the DNS server does not ensure integrity of zone transfers by TSIG or SIG(0) signing, this is a finding.
Fix: F-59683r1_fix
Configure the DNS server with transaction signing (TSIG) or SIG(0).
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- SRG-APP-000219-DNS-000029
- Vuln IDs
-
- V-54827
- Rule IDs
-
- SV-69073r1_rule
Checks: C-55449r1_chk
Review the DNS server configuration to determine if communication sessions for dynamic updates are provided authenticity protection. If communications sessions do not employ authenticity protections, this is a finding.
Fix: F-59685r1_fix
Configure the DNS server to employ mechanisms to protect the authenticity of communications sessions for dynamic updates.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- SRG-APP-000219-DNS-000030
- Vuln IDs
-
- V-54829
- Rule IDs
-
- SV-69075r1_rule
Checks: C-55451r1_chk
Review the DNS server configuration to ensure all zones are configured to provide resolvers with verification of query response integrity via DNSSEC. If the DNS Server configuration is not configured to provide resolvers with verification of query response integrity via the implementation of DNSSEC, this is a finding.
Fix: F-59687r1_fix
Configure the DNS server to provide resolvers with verification of query response integrity via DNSSEC.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-DNS-000031
- Vuln IDs
-
- V-54831
- Rule IDs
-
- SV-69077r1_rule
Checks: C-55453r1_chk
Review the DNS server implementation configuration to determine if the DNS server fails to a secure state if system initialization fails, shutdown fails, or aborts fail. If the DNS server does not fail to a secure state under these conditions, this is a finding.
Fix: F-59689r1_fix
Configure the DNS server to fail to a secure state if system initialization fails, shutdown fails, or aborts fail.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- SRG-APP-000226-DNS-000032
- Vuln IDs
-
- V-54833
- Rule IDs
-
- SV-69079r1_rule
Checks: C-55455r1_chk
Review the DNS server implementation configuration to determine if the DNS server preserves any information necessary to determine cause of system failure and any information necessary to return to operations with least disruption to mission processes. If the DNS server does not preserve the necessary information, this is a finding.
Fix: F-59691r1_fix
Configure the DNS server to preserve any information necessary to determine cause of system failure and any information necessary to return to operations with least disruption to mission processes.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- SRG-APP-000231-DNS-000033
- Vuln IDs
-
- V-54835
- Rule IDs
-
- SV-69081r1_rule
Checks: C-55457r1_chk
Review the DNS server implementation configuration to determine if the DNS server protects the confidentiality and integrity of secret/private cryptographic keys at rest and the integrity of DNS information at rest. If the DNS server does not properly protect confidentiality and integrity, this is a finding.
Fix: F-59693r1_fix
Configure the DNS server to protect the confidentiality and integrity of secret/private cryptographic keys at rest and the integrity of DNS information at rest.
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- SRG-APP-000243-DNS-000034
- Vuln IDs
-
- V-54837
- Rule IDs
-
- SV-69083r1_rule
Checks: C-55459r1_chk
Review the DNS vendor documentation and system configuration to determine if object reuse is protected. If object reuse is not protected, this is a finding.
Fix: F-59695r1_fix
Configure the DNS system to protect object reuse to prevent unauthorized and unintended information transfer via shared system resources.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- SRG-APP-000246-DNS-000035
- Vuln IDs
-
- V-54839
- Rule IDs
-
- SV-69085r1_rule
Checks: C-55461r1_chk
Review the DNS server implementation documentation and system settings to determine if the system restricts the ability of users or systems to launch Denial of Service (DoS) attacks against other information systems or networks from the DNS server. If the DNS system is not configured to restrict this ability, this is a finding.
Fix: F-59697r1_fix
Configure the DNS system to restrict the ability of users or other systems to launch Denial of Service (DoS) attacks from the DNS system.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- SRG-APP-000247-DNS-000036
- Vuln IDs
-
- V-54841
- Rule IDs
-
- SV-69087r1_rule
Checks: C-55463r1_chk
Review the DNS server implementation and configuration to determine if excess capacity and bandwidth are managed and redundancy is built into the system to limit the effects of information flooding types of DoS attacks. If excess capacity and bandwidth are not managed, or redundancy is not built into the architecture, this is a finding.
Fix: F-59699r1_fix
Configure the DNS server to manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of DoS attacks.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- SRG-APP-000251-DNS-000037
- Vuln IDs
-
- V-54843
- Rule IDs
-
- SV-69089r1_rule
Checks: C-55465r1_chk
Review the DNS server implementation configuration to determine if the DNS server checks the validity of all data inputs except those specifically identified by the organization. If the DNS server does not check the validity of all data inputs, this is a finding.
Fix: F-59701r1_fix
Configure the DNS server to check the validity of all data inputs except those specifically identified by the organization.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-001294
- Version
- SRG-APP-000275-DNS-000040
- Vuln IDs
-
- V-54845
- Rule IDs
-
- SV-69091r1_rule
Checks: C-55467r1_chk
Review the DNS server implementation configuration to determine if the DNS server is configured to generate audit records for failed security verification tests so that the ISSO and ISSM can be notified of the failures. If the DNS server is not configured to generate such audit records, this is a finding.
Fix: F-59703r1_fix
Configure the DNS server to generate audit records for failed security verification tests so that the ISSO and ISSM can be notified of the failures.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-002201
- Version
- SRG-APP-000333-DNS-000104
- Vuln IDs
-
- V-54847
- Rule IDs
-
- SV-69093r1_rule
Checks: C-55469r1_chk
Review the DNS configuration files. Verify the DNS name server is explicitly configured to refuse queries asking for its version information. If the name server is not configured to explicitly refuse queries asking for its version information, this is a finding.
Fix: F-59705r1_fix
Configure the name server to refuse queries for its version information.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-002201
- Version
- SRG-APP-000333-DNS-000107
- Vuln IDs
-
- V-54849
- Rule IDs
-
- SV-69095r1_rule
Checks: C-55471r1_chk
Review the DNS configuration files. Verify there are not any HINFO, RP, TXT, or LOC RR type RRs in the configuration. If there are any HINFO, RP, TXT or LOC RR type RRs in the configuration, this is a finding.
Fix: F-59707r1_fix
Configure the DNS configuration to not include any HINFO, RP, TXT, or LOC RR type RRs.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-001914
- Version
- SRG-APP-000353-DNS-000045
- Vuln IDs
-
- V-54851
- Rule IDs
-
- SV-69097r1_rule
Checks: C-55473r1_chk
Review the DNS server implementation configuration to determine if the DNS server is configured to allow DNS administrators to change the auditing to be performed on all DNS server components, based on all selectable event criteria. If the DNS server is not configured to allow DNS administrators to change the auditing to be performed on all DNS server components, based on all selectable event criteria, this is a finding.
Fix: F-59709r1_fix
Configure the DNS server to allow DNS administrators to change the auditing to be performed on all DNS server components, based on all selectable event criteria.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-APP-000001-DNS-000001
- Vuln IDs
-
- V-54853
- Rule IDs
-
- SV-69099r1_rule
Checks: C-55475r1_chk
Review the DNS server configuration and ensure a limit has been defined for the number of outbound zone transfers to only be allowed to the specified secondary name servers. If the DNS server configuration does not explicitly specify which hosts to which it sends zone transfers, this is a finding.
Fix: F-59711r1_fix
Configure the DNS primary server to explicitly specify which hosts to which it sends zone transfers.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000383-DNS-000047
- Vuln IDs
-
- V-54855
- Rule IDs
-
- SV-69101r2_rule
Checks: C-55477r1_chk
Review the DNS server configuration to determine if recursion is being performed on an authoritative name server. If an authoritative name server also performs recursion, this is a finding.
Fix: F-59713r1_fix
Ensure the DNS server is not defined as both authoritative and recursive.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002039
- Version
- SRG-APP-000390-DNS-000048
- Vuln IDs
-
- V-54857
- Rule IDs
-
- SV-69103r1_rule
Checks: C-55481r1_chk
Review the DNS server implementation configuration to determine if the DNS server requires devices to re-authenticate each time a zone transfer is initiated and each time a client makes a dynamic update request. If the DNS server does not require devices to re-authenticate each time a zone transfer is initiated and each time a client makes a dynamic update request, this is a finding. Note that the requirement should be inherently met if DNSSEC and TSIG/SIG(0) are enabled.
Fix: F-59717r1_fix
Configure the DNS server to require devices to re-authenticate each time a zone transfer is initiated and each time a client makes a dynamic update request. Note that the requirement should be inherently met if DNSSEC and TSIG/SIG(0) are enabled.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- SRG-APP-000394-DNS-000049
- Vuln IDs
-
- V-54861
- Rule IDs
-
- SV-69107r1_rule
Checks: C-55483r1_chk
Review the DNS server implementation configuration to determine if the DNS server authenticates the other DNS server before responding to a server-to-server transaction. If the DNS server does not authenticate the other DNS server, this is a finding.
Fix: F-59719r1_fix
Configure the DNS server to authenticate the other DNS server before responding to a server-to-server transaction.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- SRG-APP-000395-DNS-000050
- Vuln IDs
-
- V-54863
- Rule IDs
-
- SV-69109r1_rule
Checks: C-55485r1_chk
Review the DNS server implementation configuration to determine if the DNS server authenticates another DNS server before establishing a remote and/or network connection using bidirectional authentication that is cryptographically based. If the DNS server does not authenticate another DNS server before establishing a connection, this is a finding.
Fix: F-59721r1_fix
Configure the DNS server to authenticate another DNS server before establishing a remote and/or network connection using bidirectional authentication that is cryptographically based.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001991
- Version
- SRG-APP-000401-DNS-000051
- Vuln IDs
-
- V-54865
- Rule IDs
-
- SV-69111r1_rule
Checks: C-55487r1_chk
Review the DNS server implementation configuration to determine if the DNS server, for PKI-based authentication (i.e., SIG(0)), implements a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network. If the DNS server does not implement such a cache of revocation data, this is a finding.
Fix: F-59723r1_fix
Configure the DNS server, for PKI-based authentication, to implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000420-DNS-000053
- Vuln IDs
-
- V-54867
- Rule IDs
-
- SV-69113r1_rule
Checks: C-55489r1_chk
Review the DNS server implementation configuration to determine if the DNS server provides data origin artifacts for internal name/address resolution queries. If the DNS server does not provide these data origin artifacts, this is a finding.
Fix: F-59725r1_fix
Configure the DNS server to provide data origin artifacts for internal name/address resolution queries.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000421-DNS-000054
- Vuln IDs
-
- V-54869
- Rule IDs
-
- SV-69115r1_rule
Checks: C-55491r1_chk
Review the DNS server implementation configuration to determine if the DNS server provides data integrity protection artifacts for internal name/address resolution queries. If the DNS server does not provide these artifacts, this is a finding.
Fix: F-59727r1_fix
Configure the DNS server to provide data integrity protection artifacts for internal name/address resolution queries.
- RMF Control
- SC-20
- Severity
- M
- CCI
- CCI-002462
- Version
- SRG-APP-000422-DNS-000055
- Vuln IDs
-
- V-54871
- Rule IDs
-
- SV-69117r1_rule
Checks: C-55493r1_chk
Review the DNS server implementation configuration to determine if the DNS server provides additional integrity artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries. If the DNS server does not provide such integrity artifacts, this is a finding.
Fix: F-59729r1_fix
Configure the DNS server to provide additional integrity artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries.
- RMF Control
- SC-21
- Severity
- M
- CCI
- CCI-002465
- Version
- SRG-APP-000423-DNS-000056
- Vuln IDs
-
- V-54873
- Rule IDs
-
- SV-69119r1_rule
Checks: C-55497r1_chk
Review the DNS server implementation configuration to determine if the DNS server requests data origin authentication verification on the name/address resolution responses the system receives from authoritative sources. If the DNS server does not request data origin authentication verification on the responses, this is a finding.
Fix: F-59731r1_fix
Configure the DNS server to request data origin authentication verification on the name/address resolution responses the system receives from authoritative sources.
- RMF Control
- SC-21
- Severity
- M
- CCI
- CCI-002466
- Version
- SRG-APP-000424-DNS-000057
- Vuln IDs
-
- V-54875
- Rule IDs
-
- SV-69121r1_rule
Checks: C-55499r1_chk
Review the DNS server implementation configuration to determine if the DNS server requests data integrity verification on the name/address resolution responses the system receives from authoritative sources. If the DNS server does not request data integrity verification on the responses, this is a finding.
Fix: F-59733r1_fix
Configure the DNS server to request data integrity verification on the name/address resolution responses the system receives from authoritative sources.
- RMF Control
- SC-21
- Severity
- M
- CCI
- CCI-002467
- Version
- SRG-APP-000425-DNS-000058
- Vuln IDs
-
- V-54877
- Rule IDs
-
- SV-69123r1_rule
Checks: C-55501r1_chk
Review the DNS server implementation configuration to determine if the DNS server performs data integrity verification on the name/address resolution responses the system receives from authoritative sources. If the DNS server does not perform data integrity verification on the responses, this is a finding.
Fix: F-59737r1_fix
Configure the DNS server to perform data integrity verification on the name/address resolution responses the system receives from authoritative sources.
- RMF Control
- SC-21
- Severity
- M
- CCI
- CCI-002468
- Version
- SRG-APP-000426-DNS-000059
- Vuln IDs
-
- V-54885
- Rule IDs
-
- SV-69131r1_rule
Checks: C-55511r1_chk
Review the DNS server implementation configuration to determine if the DNS server performs data origin verification authentication on the name/address resolution responses the system receives from authoritative sources. If the DNS server does not perform data origin verification authentication on the responses, this is a finding.
Fix: F-59747r1_fix
Configure the DNS server to perform data origin verification authentication on the name/address resolution responses the system receives from authoritative sources.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- SRG-APP-000427-DNS-000060
- Vuln IDs
-
- V-54887
- Rule IDs
-
- SV-69133r1_rule
Checks: C-55513r2_chk
If the DNS server is using SIG(0), review the DNS server implementation configuration to determine if the DNS server only allows the use of DoD PKI-established certificate authorities for verification of the establishment of protected transactions. If the DNS server allows the use of other certificate authorities, this is a finding.
Fix: F-59749r2_fix
Configure the DNS server to only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected transactions.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- SRG-APP-000429-DNS-000062
- Vuln IDs
-
- V-54889
- Rule IDs
-
- SV-69135r1_rule
Checks: C-55515r1_chk
Review the DNS server implementation configuration to determine if the DNS server utilizes cryptographic mechanisms to prevent unauthorized disclosure of non-DNS data while stored on the DNS server. If the DNS server does not utilize cryptographic mechanisms to prevent unauthorized disclosure, this is a finding.
Fix: F-59751r1_fix
Configure the DNS server to utilize cryptographic mechanisms to prevent unauthorized disclosure of non-DNS data while stored on the DNS server.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-APP-000439-DNS-000063
- Vuln IDs
-
- V-54891
- Rule IDs
-
- SV-69137r1_rule
Checks: C-55517r1_chk
Review the DNS implementation configuration to determine if the DNS server protects the integrity of transmitted information. If the DNS server does not protect the integrity of transmitted information, this is a finding.
Fix: F-59753r2_fix
Configure the DNS server to protect the integrity of transmitted information.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002421
- Version
- SRG-APP-000440-DNS-000065
- Vuln IDs
-
- V-54895
- Rule IDs
-
- SV-69141r1_rule
Checks: C-55521r1_chk
Review the DNS server implementation configuration to determine if the DNS server implements cryptographic mechanisms to detect changes to information during transmission unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Protected Distribution System (PDS). If the DNS server does not implement such cryptographic mechanisms, this is a finding.
Fix: F-59757r1_fix
Configure the DNS server to detect changes to information during transmission unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Protected Distribution Systems (PDS).
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002420
- Version
- SRG-APP-000441-DNS-000066
- Vuln IDs
-
- V-54897
- Rule IDs
-
- SV-69143r1_rule
Checks: C-55523r1_chk
Review the DNS server implementation configuration to determine if the DNS server maintains the integrity of information during preparation for transmission. If the DNS server does not maintain the integrity during preparation for transmission, this is a finding.
Fix: F-59759r1_fix
Configure the DNS server to maintain the integrity of information during preparation for transmission.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002422
- Version
- SRG-APP-000442-DNS-000067
- Vuln IDs
-
- V-54899
- Rule IDs
-
- SV-69145r1_rule
Checks: C-55525r1_chk
Review the DNS server implementation configuration to determine if the DNS server maintains the integrity of information during reception. If the DNS server does not maintain integrity during reception, this is a finding.
Fix: F-59761r1_fix
Configure the DNS server to maintain the integrity of information during reception.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-002754
- Version
- SRG-APP-000447-DNS-000068
- Vuln IDs
-
- V-54901
- Rule IDs
-
- SV-69147r1_rule
Checks: C-55527r1_chk
Review the DNS server implementation configuration to determine if the DNS server behaves in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received. If the DNS server does not behave in such a manner, this is a finding.
Fix: F-59763r1_fix
Configure the DNS server to behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000451-DNS-000069
- Vuln IDs
-
- V-54903
- Rule IDs
-
- SV-69149r1_rule
Checks: C-55529r1_chk
Review the DNS server implementation operating documentation to determine if procedures exist to promote a secondary name server to the master in the event the master DNS name server permanently loses functionality. If procedures do not exist to promote a secondary name server to the master in the event the master DNS name server permanently loses functionality, this is a finding.
Fix: F-59765r1_fix
Develop internal procedures to ensure a secondary name server to the master in the event the master DNS name server permanently loses functionality.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002699
- Version
- SRG-APP-000473-DNS-000072
- Vuln IDs
-
- V-54905
- Rule IDs
-
- SV-69151r1_rule
Checks: C-55531r1_chk
Review the DNS server implementation configuration to determine if the DNS server performs verification of the correct operation of security functions: upon system start-up and/or restart; upon command by a user with privileged access; and/or every 30 days. If the DNS server does not perform this verification when needed, this is a finding.
Fix: F-59767r1_fix
Configure the DNS server to perform verification of the correct operation of security functions: upon system start-up and/or restart; upon command by a user with privileged access; and/or every 30 days.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002702
- Version
- SRG-APP-000474-DNS-000073
- Vuln IDs
-
- V-54907
- Rule IDs
-
- SV-69153r1_rule
Checks: C-55533r1_chk
Review the DNS server implementation configuration to determine if the DNS server logs the event and notifies the system administrator when anomalies in the operation of the signed zone transfers are discovered. If the DNS server implementation does not log the event and notify the system administrator when anomalies in the operation of the signed zone transfers are discovered, this is a finding.
Fix: F-59769r1_fix
Configure the DNS server to log the event and notify the system administrator when anomalies in the operation of the signed zone transfers are discovered.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000504-DNS-000074
- Vuln IDs
-
- V-54909
- Rule IDs
-
- SV-69155r1_rule
Checks: C-55535r1_chk
Review the DNS system to determine if it is configured to log success and failure of the start and stop of the name server service or daemon. If the DNS system is not configured to log these events, this is a finding.
Fix: F-59771r1_fix
Configure the DNS system to log success and failure of the start and stop of the name service or daemon.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000504-DNS-000082
- Vuln IDs
-
- V-54911
- Rule IDs
-
- SV-69157r1_rule
Checks: C-55537r1_chk
Review the DNS system to determine if it is configured to log, at a minimum, success and failure of zone transfers dynamic updates, and start and stop of the name server service or daemon. If the DNS is not configured to log success and failure of zone transfers, zone update notifications, dynamic updates, and start and stop of the name server service or daemon, this is a finding.
Fix: F-59773r1_fix
Configure the DNS system to log success and failure of zone transfers, zone update notifications, dynamic updates, and start and stop of the name server service or daemon.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000514-DNS-000075
- Vuln IDs
-
- V-54915
- Rule IDs
-
- SV-69161r1_rule
Checks: C-55541r1_chk
Review the DNS implementation and configuration files to ensure FIPS-validated cryptography is being used when provisioning digital signatures, generating cryptographic hashes, and protecting unclassified information that requires confidentiality. If the DNS configuration does not use FIPS-validated cryptography, this is a finding.
Fix: F-59777r2_fix
Configure the DNS implementation to use NIST FIPS-validated cryptography for provisioning digital signatures, generating cryptographic hashes, and protecting unclassified information requiring confidentiality.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000077
- Vuln IDs
-
- V-54917
- Rule IDs
-
- SV-69163r1_rule
Checks: C-55543r1_chk
Check the DNS configuration files and operational documentation. If the zone's RRs have been signed with NSEC3, the operational procedures should stipulate to change the salt value every time the zone is completely re-signed. If the operational procedures do not specify to change the salt value for RRs signed with NSEC3 every time the zone is completely re-signed, this is a finding.
Fix: F-59779r1_fix
Include instructions in the DNS operational procedures to change the salt value every time RRs signed by NSEC3 have been re-signed.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000078
- Vuln IDs
-
- V-54919
- Rule IDs
-
- SV-69165r1_rule
Checks: C-55545r1_chk
Review the DNS configuration files. Ensure the validity period for RRSIGs has been explicitly configured and is configured for a range of no less than two days and no more than one week. If the validity period for the RRSIGs covering a zone's DNSKEY RRSet is less than two days or greater than one week, this is a finding.
Fix: F-59781r1_fix
Configure RRSIGs covering each zone's DNSKEY RRSet to be greater than two days and less than one week.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000084
- Vuln IDs
-
- V-54921
- Rule IDs
-
- SV-69167r1_rule
Checks: C-55547r1_chk
Review the zone file's configuration for internal zones and confirm the NSEC3 RR option is used to provide authenticated denial of existence. If the NSEC3 RR option is not used for internal zones, this is a finding.
Fix: F-59783r1_fix
Configure all internal zones to use the NSEC3 RR option for authenticated denial of existence.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000085
- Vuln IDs
-
- V-54923
- Rule IDs
-
- SV-69169r1_rule
Checks: C-55549r1_chk
Review the zone file's configuration and confirm that each NS record points to an active name server authoritative for the domain. If this is not the case, this is a finding.
Fix: F-59785r1_fix
Remove any NS record in a zone file that does not point to an active name server authoritative for the domain specified in that record.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000086
- Vuln IDs
-
- V-54925
- Rule IDs
-
- SV-69171r1_rule
Checks: C-55551r1_chk
Review the DNS implementation and documentation and confirm the permissions on the key files, which were generated by the dnssec-keygen program and copied to the name server, are only accessible to the server administrator or have been deleted. Verify all paper copies of the key files have been destroyed. If the key files have been deleted and all paper copies have been destroyed, this is not a finding. If the key files have been deleted but the paper copies have not been destroyed, this is a finding. If the key files still exist, and the permissions on the key files have not been configured to only allow the server administrator account access, this is a finding.
Fix: F-59787r1_fix
Configure permissions on the key files to only give access to the server administrator, or delete the key files altogether. Destroy all paper copies of the key files.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000087
- Vuln IDs
-
- V-54927
- Rule IDs
-
- SV-69173r1_rule
Checks: C-55553r1_chk
Review the DNS configuration files to determine all of the NS records for each zone. Based upon the NS records for each zone, determine location of each of the name servers. Verify all authoritative name servers are located on different network segments. If two authoritative name servers are found on the same network segment, and one of those two is hidden, this is not a finding. If any authoritative name servers are located on the same network segment as another authoritative name server, this is a finding.
Fix: F-59789r1_fix
Locate all visible (non-hidden) name servers to be on different network segments.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000088
- Vuln IDs
-
- V-54929
- Rule IDs
-
- SV-69175r1_rule
Checks: C-55555r1_chk
Review the DNS configuration for each zone hosted by the authoritative name server. Determine all authoritative name servers for each zone. Review the serial number in the SOA RDATA, on each authoritative name server for each zone, and ensure the serial number is the same on each secondary name server as on the primary name server. If any secondary name server for a zone has a serial number in the SOA RDATA that is different from the primary name server, this is a finding.
Fix: F-59791r1_fix
Troubleshoot and fix any problems with zone transfers completing successfully between the primary name server and all secondary name servers.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000089
- Vuln IDs
-
- V-54931
- Rule IDs
-
- SV-69177r1_rule
Checks: C-55557r2_chk
Check the DNS configuration to ensure DNSSEC Resource Records has been enabled. If the name server is not configured with DNSSEC enabled, this is a finding.
Fix: F-59793r1_fix
Configure the name server with DNSSEC enabled.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000091
- Vuln IDs
-
- V-54933
- Rule IDs
-
- SV-69179r1_rule
Checks: C-55559r1_chk
Review the Resource Records (RRs) of each zone which is split between external and internal networks. For those internal hosts which are intended to be accessed by both internal and external users, a different RR should be listed on each of the internal and external name servers, with IP addresses reflective of the external or internal network. Traffic destined for those internal hosts will resolve to the IP address in the external name server and then should be NAT'd through the perimeter firewall. Verify the RRs in the internal name server are not also listed in the external name server. If there are RRs in the internal name server for hosts also listed in the external name server, and the IP to which it resolves is on the external network, this is a finding. Verify the RRs in the external name server are not also listed in the internal name server. If there are RRs in the external name server for hosts also listed in the internal name server, and the IP to which it resolves is on the internal network, this is a finding.
Fix: F-59795r1_fix
Remove any RRs listed in the internal name server configuration which resolve for external hosts and remove any RRs listed in the external name server configuration which resolve to internal hosts. For hosts intended to be accessed by both internal and external clients, configure unique IP addresses in each of the internal and external name servers, respective to their location. The perimeter firewall, or other routing device, should handle the Network Address Translation to the true IP address of the destination.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000092
- Vuln IDs
-
- V-54935
- Rule IDs
-
- SV-69181r1_rule
Checks: C-55561r1_chk
Review the DNS implementation and ensure the external DNS name servers are not reachable by internal resolvers. If the external DNS name servers can be reached by internal resolvers, this is a finding.
Fix: F-59797r1_fix
Configure the DNS configuration on internal name servers to only accept queries from internal resolvers. Configure DNS configuration on external name servers to only accept queries from external resolvers. Configure network perimeter devices to block query resolution traffic from external resolvers to internal name servers and from internal resolvers to external name servers.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000093
- Vuln IDs
-
- V-54937
- Rule IDs
-
- SV-69183r1_rule
Checks: C-55563r2_chk
Review the DNS implementation and ensure internal DNS name servers are not reachable by external resolvers. If the internal DNS name servers can be reached by external resolvers, this is a finding.
Fix: F-59799r1_fix
Configure the DNS configuration on internal name servers to only accept queries from internal resolvers. Configure DNS configuration on external name servers to only accept queries from external resolvers. Configure network perimeter devices to block query resolution traffic from external resolvers to internal name servers and from internal resolvers to external name servers.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000095
- Vuln IDs
-
- V-54939
- Rule IDs
-
- SV-69185r1_rule
Checks: C-55565r1_chk
Review the DNS configuration files. Verify a configuration is in place to limit the secondary name servers from which an authoritative name server receives zone transfer requests. If a configuration is not in place to limit the secondary name servers from which an authoritative name server receives zone transfer requests, this is a finding.
Fix: F-59801r1_fix
Configure the authoritative name server to specify which secondary name servers from which it will receive zone transfer requests.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000097
- Vuln IDs
-
- V-54941
- Rule IDs
-
- SV-69187r1_rule
Checks: C-55567r1_chk
Review DNS implementation documentation to determine whether the DNS system has capabilities compliant to IETF RFC-1034 (Domain Names-Concepts and Facilities), RFC-1035 (Domain Names-Implementation and Specification), and subsequent RFCs. Systems using DNSSEC (DNS Security Extensions) should be compliant to RFC-4033 (DNS Security Introduction and Requirements), RFC-4024 (Resource Records for the DNS Security Extensions), RFC-4035 (Protocol Modifications for the DNS security Extensions), RFC-5155 (DNS Security (DNSSEC) Hashed Authenticated Denial of Existence) and related RFCs. A DNS implementation may also be found non-compliant by empirical analysis, i.e., by experimentally querying and examine the answer. For example, a DNS implementation may not answer a query for the 'NS' resource record type with a CNAME reply. If the implementation does not comply to the IETF DNS RFCs, this is a finding.
Fix: F-59803r1_fix
Configure the DNS implementation to be compliant to the IETF specifications for DNS. Protect DNS transactions, such as update of DNS name resolution data and data replication that involve DNS nodes within an enterprise's control. The transactions should be protected using hash-based message authentication codes based on shared secrets, as outlined in Internet Engineering Task Force's (IETF) Transaction Signature (TSIG) specification. Protect the ubiquitous DNS query/response transaction that could involve any DNS node in the global Internet using digital signatures based on asymmetric cryptography, as outlined in IETF's Domain Name System Security Extension (DNSSEC) specification.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000099
- Vuln IDs
-
- V-54943
- Rule IDs
-
- SV-69189r1_rule
Checks: C-55569r1_chk
Review the DNS configuration and access control structure to determine if DACs are in place to limit the propagation of rights as determined by the organization. Access control lists for user permissions, as well as zone transfers and updates, must be present. If they are not present, this is a finding.
Fix: F-59805r1_fix
Configure the DNS implementation to eliminate access rights propagation.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000101
- Vuln IDs
-
- V-54945
- Rule IDs
-
- SV-69191r1_rule
Checks: C-55571r1_chk
Review the zone configuration with the DNS administrator and verify whether the zone has records on both the internal and external networks. If the zone is split, verify there is a separate external name server to handle the host records for external address space and an internal name server to handle the host records for internal address space. If there are split zones and there are not internal and external roles to protect private address space, this is a finding.
Fix: F-59807r1_fix
Configure the DNS server to separate internal and external roles to protect private address space.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000102
- Vuln IDs
-
- V-54947
- Rule IDs
-
- SV-69193r1_rule
Checks: C-55573r1_chk
Review the entries within the root hints file and validate that the entries are correct. G and H root servers are required on the NIPRNet, as a minimum. All default settings on servers must be verified and corrected if necessary. If valid root name servers are not configured, this is a finding.
Fix: F-59809r1_fix
Configure the DNS implementation to use valid root name servers.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000103
- Vuln IDs
-
- V-54949
- Rule IDs
-
- SV-69195r1_rule
Checks: C-55575r1_chk
Review the DNS implementation to determine the name server software version. If the installed name server software version is not the latest production version, this is a finding.
Fix: F-59811r1_fix
Update the installed name server software with the latest production version.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000105
- Vuln IDs
-
- V-54951
- Rule IDs
-
- SV-69197r1_rule
Checks: C-55577r1_chk
Review the account under which the DNS software is running and determine the permissions that account has been assigned. If the account under which the DNS software is running has not been restricted to the least privileged permissions required for the purpose of running the software, this is a finding.
Fix: F-59813r1_fix
Configured the permissions of the account being used to run the DNS software so that it has the least privileges required under which to run the DNS software.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000108
- Vuln IDs
-
- V-54953
- Rule IDs
-
- SV-69199r1_rule
Checks: C-55579r1_chk
Check the DNS documentation to determine if a hidden master authoritative name server is being used. If a hidden master authoritative name server is being used, check the NS records for all zones for which that hidden name server is authoritative and confirm there is not any NS record for that hidden name server. If any zone for which a hidden name server is authoritative has an NS record for that hidden name server, this is a finding. If the DNS implementation does not include any hidden name servers, this is not applicable.
Fix: F-59815r1_fix
Remove, from all zones' configuration files, any NS RRs for hidden name servers.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000109
- Vuln IDs
-
- V-54955
- Rule IDs
-
- SV-69201r1_rule
Checks: C-55581r2_chk
Review the name server configuration. Verify the server is configured to only respond to incoming 53/udp and 53/tcp and any other ports and protocols required for the underlying platform to function normally, as specified by the related OS STIG. If the DNS server is not configured to only respond to incoming 53/udp and 53/tcp and any other ports and protocols required for the underlying platform to function normally, as specified by the related OS STIG, this is a finding.
Fix: F-59817r2_fix
Configure the DNS name server to only respond to incoming 53/udp and 53/tcp and any other ports and protocols required for the underlying platform to function normally, as specified by the related OS STIG.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000110
- Vuln IDs
-
- V-54957
- Rule IDs
-
- SV-69203r1_rule
Checks: C-55583r1_chk
Review the DNS configuration. Determine if a static port is being used to send outgoing DNS messages or whether it is configured to use a random port. If the DNS configuration specifies a static port to be used for outgoing DNS messages rather than a random port, this is a finding.
Fix: F-59819r1_fix
Configure the DNS server to use a random port for outgoing DNS messages.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000111
- Vuln IDs
-
- V-54959
- Rule IDs
-
- SV-69205r1_rule
Checks: C-55585r1_chk
Review the DNS name server and documentation to determine whether it accepts dynamic updates. If dynamic updates are accepted, ensure the private key corresponding to the ZSK alone is protected with directory/file-level access control list-based or cryptography-based protections. If the private key corresponding to the ZSK alone is not protected with directory/file-level access control list-based or cryptography-based protections, this is a finding.
Fix: F-59821r1_fix
Apply permissions to the private key corresponding to the ZSK alone with read/modify permissions for the account under which the name server software is run.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000112
- Vuln IDs
-
- V-54961
- Rule IDs
-
- SV-69207r1_rule
Checks: C-55587r1_chk
Review the DNS name server and documentation to determine whether it accepts dynamic updates. If dynamic updates are not accepted, verify the private keys corresponding to both the ZSK (Zone Signing Key) and KSK (Key Signing Key) are not located on the name server. If the private keys to the ZSK and/or the KSK are located on the name server, this is a finding.
Fix: F-59823r1_fix
Store the private keys of the ZSK and KSK off-line in an encrypted file system.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000113
- Vuln IDs
-
- V-54963
- Rule IDs
-
- SV-69209r1_rule
Checks: C-55589r2_chk
Review the zone files and confirm with the DNS administrator that the hosts defined in the zone files do not resolve to hosts in another zone with its fully qualified domain name. The exceptions are glue records supporting zone delegations, CNAME records supporting a system migration, or CNAME records that point to third party Content Delivery Networks (CDN) or cloud computing platforms. In the case of third-party CDNs or cloud offerings, an approved mission need must be demonstrated. If resource records are maintained that resolve to a fully qualified domain name in another zone, and the usage is not for resource records resolving to hosts that are glue records supporting zone delegations, CNAME records supporting a system migration, or CNAME records that point to third-party Content Delivery Networks (CDN) or cloud computing platforms with a documented and approved mission need, this is a finding.
Fix: F-59825r1_fix
Remove any resource records in a zone file if the resource record resolves to a fully qualified domain name residing in another zone.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000114
- Vuln IDs
-
- V-54965
- Rule IDs
-
- SV-69211r1_rule
Checks: C-55591r3_chk
Review the DNS server's hosted zones and respective records. Within the zone statement will be a file option that will display the name of the zone file. The record type column will display CNAME. This is usually the third or fourth field in a record depending on whether the TTL value is utilized. Without a TTL value, the CNAME type will be in the third field; otherwise, it will display as the fourth field. Review the zone files and the DNS zone record documentation to confirm that there are no CNAME records older than 6 months. The exceptions are glue records supporting zone delegations, CNAME records supporting a system migration, or CNAME records that point to third party Content Delivery Networks (CDN) or cloud computing platforms. In the case of third-party CDNs or cloud offerings, an approved mission need must be demonstrated (AO approval of use of a commercial cloud offering would satisfy this requirement). If there are zone-spanning CNAME records older than 6 months and the CNAME records resolves to anything other than fully qualified domain name for glue records supporting zone delegations, CNAME records supporting a system migration, or CNAME records that point to third-party Content Delivery Networks (CDN) or cloud computing platforms with a AO-approved and documented mission need, this is a finding.
Fix: F-59827r2_fix
Remove any zone-spanning CNAME records that have been active for more than six months.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000218-DNS-000027
- Vuln IDs
-
- V-54967
- Rule IDs
-
- SV-69213r1_rule
Checks: C-55593r1_chk
Review the NS records for each zone hosted and confirm that each authoritative name server is located at a different physical location than the remaining name servers. If the master, or primary, authoritative name server is configured to be "hidden", it will not have an NS record. One other name server may be at the same physical location as the hidden name server. If all name servers, for which NS records are listed, are not physically at different locations, this is a finding.
Fix: F-59829r1_fix
Physically move name servers so that they are geographically at different locations. If moving a name server is not feasible, one of the co-located name servers could be reconfigured to be hidden.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000268-DNS-000039
- Vuln IDs
-
- V-54969
- Rule IDs
-
- SV-69215r1_rule
Checks: C-55595r1_chk
Review the DNS server implementation configuration to determine if the DNS server activates a notification to the system administrator when a component failure is detected. If the DNS server does not activate a notification to the system administrator when a failure is detected, this is a finding.
Fix: F-59831r1_fix
Configure the DNS server so that when a component failure is detected, the server activates a notification to the system administrator.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000347-DNS-000041
- Vuln IDs
-
- V-54971
- Rule IDs
-
- SV-69217r1_rule
Checks: C-55597r1_chk
Review the DNS server implementation configuration to determine if the DNS server strongly binds the identity of the DNS server with the DNS information. Examples include enabling DNSSEC and enabling TSIG or SIG(0). If the DNS server does not strongly bind the identity of the DNS server with the DNS information, this is a finding.
Fix: F-59833r1_fix
Configure the DNS server to strongly bind the identity of the DNS server with the DNS information.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000348-DNS-000042
- Vuln IDs
-
- V-54973
- Rule IDs
-
- SV-69219r1_rule
Checks: C-55599r1_chk
Review the DNS server implementation configuration to determine if the DNS server provides the means for authorized individuals to determine the identity of the source of the DNS server-provided information. If the DNS server does not provide such means, this is a finding.
Fix: F-59835r1_fix
Configure the DNS server to provide the means for authorized individuals to determine the identity of the source of the DNS server-provided information.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000349-DNS-000043
- Vuln IDs
-
- V-54975
- Rule IDs
-
- SV-69221r1_rule
Checks: C-55601r1_chk
Review the DNS server implementation configuration to determine if the DNS server validates the binding of the other DNS server's identity to the DNS information for a server-to-server transaction (e.g., zone transfer). If the DNS server does not validate the binding of the other DNS server's identity to the DNS information, this is a finding.
Fix: F-59837r1_fix
Configure the DNS server to validate the binding of the other DNS server's identity to the DNS information for a server-to-server transaction (e.g., zone transfer).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000350-DNS-000044
- Vuln IDs
-
- V-54977
- Rule IDs
-
- SV-69223r1_rule
Checks: C-55603r1_chk
Review the DNS server implementation configuration to determine if the DNS server, when it encounters an event or an error when validating the binding of another DNS server's identity to the DNS information, is configured to log the event and send notification to the DNS administrator. If the DNS server does not log the event and send notification to the DNS administrator in the event of such a validation error, this is a finding.
Fix: F-59839r1_fix
Configure the DNS server to log the event and send notification to the DNS administrator in the event an error occurs when validating the binding of another DNS server's identity to the DNS information.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000090
- Vuln IDs
-
- V-54979
- Rule IDs
-
- SV-69225r1_rule
Checks: C-55605r1_chk
Review the DNS implementation and documentation. Confirm the signature algorithm used for DNSSEC-enabled zones is FIPS-compatible. If the signature algorithm used for DNSSEC-enabled zones is not FIPS-compatible, this is a finding.
Fix: F-59841r1_fix
Regenerate signatures for all DNSSEC-enabled zones with FIPS-compatible algorithms.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-APP-000096-DNS-000007
- Vuln IDs
-
- V-55225
- Rule IDs
-
- SV-69471r1_rule
Checks: C-55845r1_chk
Review the DNS system configuration to determine if it is configured to produce, capture, and store log records that contain information to establish when (date and time) events have occurred on the system. If the logging function is not configured to produce log records with information regarding when the event took place, this is a finding.
Fix: F-60089r1_fix
Configure the DNS server to produce log records that contain information that establishes when (date and time) events have occurred on the system. Additionally, configure the audit facility of the DNS system to provide information when events have occurred.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002475
- Version
- SRG-APP-000428-DNS-000061
- Vuln IDs
-
- V-55227
- Rule IDs
-
- SV-69473r1_rule
Checks: C-55847r1_chk
Review the DNS server implementation configuration to determine if the DNS server utilizes cryptographic mechanisms to prevent unauthorized modification of zone data. If the DNS server does not utilize cryptographic mechanisms to prevent unauthorized modification, this is a finding.
Fix: F-60091r1_fix
Configure the DNS server to utilize cryptographic mechanisms to prevent unauthorized modification of zone data.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DNS-000500
- Vuln IDs
-
- V-55229
- Rule IDs
-
- SV-69475r1_rule
Checks: C-55849r1_chk
Review the DNS server implementation configuration to determine if the DNS server is configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs. If the DNS server is not configured in accordance with these settings, this is a finding.
Fix: F-60093r1_fix
Configure the DNS server to be in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.