UCF STIG Viewer Logo

Signature generation using the KSK must be done off-line, using the KSK-private stored off-line.


Overview

Finding ID Version Rule ID IA Controls Severity
V-54811 SRG-APP-000176-DNS-000096 SV-69057r1_rule Medium
Description
Security-relevant information is any information within information systems that can potentially impact the operation of security functions or the provision of security services in a manner that could result in failure to enforce system security policies or maintain the isolation of code and data. Security-relevant information includes, for example, file permissions, cryptographic key management information, configuration parameters for security services, and access control lists. Secure, non-operable system states include the times in which information systems are not performing mission/business-related processing (e.g., the system is off-line for maintenance, troubleshooting, boot-up, and shut down).
STIG Date
Domain Name System (DNS) Security Requirements Guide 2015-01-05

Details

Check Text ( C-55433r1_chk )
Verify the DNS operational procedures and confirm procedures exist to enforce generating signatures using the KSK are performed off-line, using the KSK-private stored off-line or the secure, protected module.

If the procedures do not exist or the procedures do not specify to perform the signature generation off-line from the name server, this is a finding.
Fix Text (F-59669r1_fix)
Create operation documentation to include the safe management of keys and key storage within the DNS implementation. Include in the documentation steps to ensure signature generation using the KSK are done off-line, using the KSK-private stored off-line or the secure, protected module.