STIGQter STIGQter: STIG Summary: Domain Name System (DNS) Security Requirements Guide Version: 2 Release: 4 Benchmark Date: 23 Oct 2015:

The DNS server implementation must manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of Denial of Service (DoS) attacks.

DISA Rule

SV-69087r1_rule

Vulnerability Number

V-54841

Group Title

SRG-APP-000247-DNS-000036

Rule Version

SRG-APP-000247-DNS-000036

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the DNS server to manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of DoS attacks.

Check Contents

Review the DNS server implementation and configuration to determine if excess capacity and bandwidth are managed and redundancy is built into the system to limit the effects of information flooding types of DoS attacks.

If excess capacity and bandwidth are not managed, or redundancy is not built into the architecture, this is a finding.

Vulnerability Number

V-54841

Documentable

False

Rule Version

SRG-APP-000247-DNS-000036

Severity Override Guidance

Review the DNS server implementation and configuration to determine if excess capacity and bandwidth are managed and redundancy is built into the system to limit the effects of information flooding types of DoS attacks.

If excess capacity and bandwidth are not managed, or redundancy is not built into the architecture, this is a finding.

Check Content Reference

M

Target Key

2355

Comments