UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The underlying operating system of the DNS server is not in compliance with the appropriate OS STIG.


Overview

Finding ID Version Rule ID IA Controls Severity
V-13313 DNS0170 SV-13885r1_rule ECSC-1 Medium
Description
A vulnerability in the underlying operating system of a DNS server could potentially impact not only the DNS server but the entire network infrastructure to include the Global Information Grid (GIG).
STIG Date
DNS Policy 2015-12-29

Details

Check Text ( C-9849r1_chk )
Review the Operating System against the appropriate OS STIG. For a Windows system this would mean an evaluation with the Gold Disk; for a UNIX/LINUX system this would mean an evaluation using the SRR scripts. STIG compliance means that all findings are either closed, or there is a POA&M to address any outstanding vulnerabilities.
Fix Text (F-11160r1_fix)
The underlying Operating System of the DNS server must be in compliance with the appropriate OS STIG.