UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The DNS implementation must preserve organization defined system state information in the event of a system failure.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34202 SRG-NET-000236-DNS-000143 SV-44678r1_rule Medium
Description
Failure in a known secure state helps prevent a loss of confidentiality, integrity, or availability in the event of a failure of the information system or a component of the system. Failure in a known safe state helps prevent systems from failing to a state that may cause loss of data or unauthorized access to system resources. DNS systems that fail suddenly and with no incorporated failure state planning may leave the hosting system available but with a reduced security protection capability. Preserving information system state information also facilitates system restart and return to the operational mode of the organization with less disruption of mission/business processes.
STIG Date
Domain Name System (DNS) Security Requirements Guide 2012-10-24

Details

Check Text ( C-42183r1_chk )
Review the DNS vendor documentation and configuration to determine if the DNS implementation preserves organization defined system state information in the event of a system failure. If the system does not preserve organization defined system state information, this is a finding.
Fix Text (F-38132r1_fix)
Ensure the DNS implementation preserves organization defined system state information in the event of a system failure.