STIGQter STIGQter: STIG Summary: Domain Name System (DNS) Security Requirements Guide Version: 2 Release: 4 Benchmark Date: 23 Oct 2015:

The DNS implementation must limit the number of concurrent sessions client connections to the number of allowed dynamic update clients.

DISA Rule

SV-69023r1_rule

Vulnerability Number

V-54777

Group Title

SRG-APP-000001-DNS-000115

Rule Version

SRG-APP-000001-DNS-000115

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the DNS primary server to explicitly specify which hosts from which it accepts dynamic updates.

Check Contents

Review the DNS server configuration and ensure a limit has been defined for the number of inbound dynamic update sessions by defining the finite group of hosts allowed to provide those dynamic updates.

If the DNS server configuration does not explicitly specify which hosts from which it accepts dynamic updates, this is a finding.

Vulnerability Number

V-54777

Documentable

False

Rule Version

SRG-APP-000001-DNS-000115

Severity Override Guidance

Review the DNS server configuration and ensure a limit has been defined for the number of inbound dynamic update sessions by defining the finite group of hosts allowed to provide those dynamic updates.

If the DNS server configuration does not explicitly specify which hosts from which it accepts dynamic updates, this is a finding.

Check Content Reference

M

Target Key

2355

Comments