UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The platform on which the name server software is hosted must only run processes and services needed to support the BIND 9.x implementation.


Overview

Finding ID Version Rule ID IA Controls Severity
V-72367 BIND-9X-001002 SV-86991r1_rule Medium
Description
Hosts that run the name server software should not provide any other services. Unnecessary services running on the DNS server can introduce additional attack vectors leading to the compromise of an organization’s DNS architecture.
STIG Date
BIND 9.x Security Technical Implementation Guide 2019-06-28

Details

Check Text ( C-72571r1_chk )
Verify that the BIND 9.x server is dedicated for DNS traffic:

With the assistance of the DNS administrator, identify all of the processes running on the BIND 9.x server:

# ps -ef | less

If any of the identified processes are not in support of normal OS functionality or in support of the BIND 9.x process, this is a finding.
Fix Text (F-78723r1_fix)
Disable or uninstall all non-DNS related applications from the BIND 9.x server.