UCF STIG Viewer Logo

The DNS implementation must prohibit password reuse for the organization defined number of generations.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34105 SRG-NET-000154-DNS-000093 SV-44558r1_rule Medium
Description
The more complex the password is, the greater the number of possible combinations that need to be tested before the password is compromised. Password strength is a measure of the effectiveness of a password in resisting guessing, dictionary attacks and brute-force attacks. Restricting password reuse is just one factor of several that helps to determine strength and how long it takes to crack a password. Without the use of a complex password that is changed often, gaining access to the DNS infrastructure is relatively easy for an attacker. If a password is used over and over again, it provides the attacker much more time to try and crack the password. Therefore, limiting the number of times a password can be reused, increases the time and resources required to compromise the password.
STIG Date
Domain Name System (DNS) Security Requirements Guide 2012-10-24

Details

Check Text ( C-42065r1_chk )
Review the DNS account management configuration and settings to determine whether password reuse for the organization defined number of generations, is prohibited. If the DNS configuration does not prohibit password reuse, this is a finding.

The account management functions will be performed by the name server application if the capability exists. If the capability does not exist the underlying platform's account management system may be used.
Fix Text (F-38015r1_fix)
Configure the DNS implementation to prohibit password reuse for the organization defined number of generations.