Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-33937 | SRG-NET-000048-DNS-000025 | SV-44390r1_rule | Low |
Description |
---|
As most "users" of a DNS platform are administrators, they need to be very vigilant in maintaining situational awareness of activity that occurs regarding their accounts. Providing them with information regarding the date and time of their last successful login allows them to determine if any unauthorized activity has occurred, gives them an opportunity to notify appropriate security personnel if necessary, and ensure other systems have not been affected. If administrators are not aware of potential attacks against a system, they cannot perform due diligence to ensure access is not granted to unauthorized users. |
STIG | Date |
---|---|
Domain Name System (DNS) Security Requirements Guide | 2012-10-24 |
Check Text ( C-41946r1_chk ) |
---|
Review the DNS system configuration to determine if the last logon time and date is displayed upon successful logon. Request the system administrator to log in to the server for verification of the configuration. If the date and time of last log on is not displayed, this is a finding. |
Fix Text (F-37850r1_fix) |
---|
Configure the DNS system to display the time and date of the last successful user logon to the system. |