STIGQter STIGQter: STIG Summary: Domain Name System (DNS) Security Requirements Guide Version: 2 Release: 4 Benchmark Date: 23 Oct 2015: A DNS server implementation must provide additional data origin artifacts along with the authoritative data the system returns in response to external name/address resolution queries.

DISA Rule

SV-69061r1_rule

Vulnerability Number

V-54815

Group Title

SRG-APP-000213-DNS-000024

Rule Version

SRG-APP-000213-DNS-000024

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Generate an RRSET for each zone hosted by the DNS server to include an RRSIG, DNSKEY and NSEC for each zone.

Check Contents

Review the zones hosted by the DNS server. Verify each of the zones have been digitally signed.

To determine if the zones have been digitally signed, verify the existence of an RRSET for each zone, which will include, at a minimum, an RRType RRSIG (Resource Record Signature) as well as an RRType DNSKEY and RRType NSEC (Next Secure).

If the DNS server's zones do not contain these additional RRs along with the regular RRs, this is a finding.

Vulnerability Number

V-54815

Documentable

False

Rule Version

SRG-APP-000213-DNS-000024

Severity Override Guidance

Review the zones hosted by the DNS server. Verify each of the zones have been digitally signed.

To determine if the zones have been digitally signed, verify the existence of an RRSET for each zone, which will include, at a minimum, an RRType RRSIG (Resource Record Signature) as well as an RRType DNSKEY and RRType NSEC (Next Secure).

If the DNS server's zones do not contain these additional RRs along with the regular RRs, this is a finding.

Check Content Reference

M

Target Key

2355

Comments