UCF STIG Viewer Logo

The underlying operating system of the DNS server is not in compliance with the appropriate OS STIG.


Overview

Finding ID Version Rule ID IA Controls Severity
V-13313 DNS0170 SV-13885r1_rule Medium
Description
A vulnerability in the underlying operating system of a DNS server could potentially impact not only the DNS server but the entire network infrastructure to include the Global Information Grid (GIG).
STIG Date
DNS Policy Security Technical Implementation Guide 2017-10-02

Details

Check Text ( C-9849r1_chk )
Review the Operating System against the appropriate OS STIG. For a Windows system this would mean an evaluation with the Gold Disk; for a UNIX/LINUX system this would mean an evaluation using the SRR scripts. STIG compliance means that all findings are either closed, or there is a POA&M to address any outstanding vulnerabilities.
Fix Text (F-11160r1_fix)
The underlying Operating System of the DNS server must be in compliance with the appropriate OS STIG.