UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The DNS implementation must enforce minimum password length.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34104 SRG-NET-000153-DNS-000092 SV-44557r1_rule Medium
Description
The more complex the password is, the greater the number of possible combinations that need to be tested before the password is compromised. Password strength is a measure of the effectiveness of a password in resisting guessing, dictionary attacks and brute-force attacks. Password length is just one factor of several that helps to determine strength and how long it takes to crack a password. The shorter the password is, the lower the number of possible combinations required to be tested before the password is compromised. Without the use of a complex password, access to the DNS infrastructure is relatively easy for an attacker. Use of a complex password helps to increase the time and resources required to compromise the password.
STIG Date
Domain Name System (DNS) Security Requirements Guide 2012-10-24

Details

Check Text ( C-42064r1_chk )
Review the DNS account management configuration and settings to determine whether the minimum password length is configured. If the DNS configuration does not enforce a minimum password length, this is a finding.

The account management functions will be performed by the name server application if the capability exists. If the capability does not exist the underlying platform's account management system may be used.
Fix Text (F-38014r1_fix)
Configure the DNS implementation to enforce a minimum password length.