Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
SRG-APP-000516-DNS-000096 | SRG-APP-000516-DNS-000096 | SRG-APP-000516-DNS-000096_rule | Medium |
Description |
---|
Security-relevant information is any information within information systems that can potentially impact the operation of security functions or the provision of security services in a manner that could result in failure to enforce system security policies or maintain the isolation of code and data. Security-relevant information includes, for example, file permissions, cryptographic key management information, configuration parameters for security services, and access control lists. Secure, non-operable system states include the times in which information systems are not performing mission/business-related processing (e.g., the system is off-line for maintenance, troubleshooting, boot-up, and shut down). |
STIG | Date |
---|---|
Domain Name System (DNS) Security Requirements Guide | 2014-07-11 |
Check Text ( C-SRG-APP-000516-DNS-000096_chk ) |
---|
Verify the DNS operational procedures and confirm procedures exist to enforce generating signatures using the KSK are performed off-line, using the KSK-private stored off-line or the secure, protected module. If the procedures do not exist, or the procedures do not specify to perform the signature generation off-line from the name server, this is a finding. |
Fix Text (F-SRG-APP-000516-DNS-000096_fix) |
---|
Create operation documentation to include the safe management of keys and key storage within the DNS implementation. Include in the documentation steps to ensure signature generation using the KSK are done off-line, using the KSK-private stored off-line or the secure, protected module. |