UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The DNS server implementation must be configured to disable non-essential capabilities.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-APP-000141-DNS-000013 SRG-APP-000141-DNS-000013 SRG-APP-000141-DNS-000013_rule Medium
Description
Applications are capable of providing a wide variety of functions and services. Some of the functions and services, provided by default, may not be necessary to support essential organizational operations (e.g., key missions, functions). It is detrimental for applications to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooked and therefore may remain unsecured. They increase the risk to the platform by providing additional attack vectors. The DNS server should only provide those DNS functions that are required, so it should be configured accordingly.
STIG Date
Domain Name System (DNS) Security Requirements Guide 2014-07-11

Details

Check Text ( C-SRG-APP-000141-DNS-000013_chk )
Review the DNS server implementation configuration to determine if the DNS server disables non-essential capabilities. If any non-essential capabilities are enabled, this is a finding.
Fix Text (F-SRG-APP-000141-DNS-000013_fix)
Configure the DNS server to disable non-essential capabilities.