STIGQter STIGQter: STIG Summary: BIND 9.x Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 22 Jan 2021:

The platform on which the name server software is hosted must only run processes and services needed to support the BIND 9.x implementation.

DISA Rule

SV-207534r612253_rule

Vulnerability Number

V-207534

Group Title

SRG-APP-000516-DNS-000109

Rule Version

BIND-9X-001002

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Disable or uninstall all non-DNS related applications from the BIND 9.x server.

Check Contents

Verify that the BIND 9.x server is dedicated for DNS traffic:

With the assistance of the DNS administrator, identify all of the processes running on the BIND 9.x server:

# ps -ef | less

If any of the identified processes are not in support of normal OS functionality or in support of the BIND 9.x process, this is a finding.

Vulnerability Number

V-207534

Documentable

False

Rule Version

BIND-9X-001002

Severity Override Guidance

Verify that the BIND 9.x server is dedicated for DNS traffic:

With the assistance of the DNS administrator, identify all of the processes running on the BIND 9.x server:

# ps -ef | less

If any of the identified processes are not in support of normal OS functionality or in support of the BIND 9.x process, this is a finding.

Check Content Reference

M

Target Key

2926

Comments