UCF STIG Viewer Logo

The DNS server implementation must strongly bind the identity of the DNS server with the DNS information.


Overview

Finding ID Version Rule ID IA Controls Severity
V-54971 SRG-APP-000347-DNS-000041 SV-69217r1_rule Medium
Description
Weakly bound credentials can be modified without invalidating the credential; therefore, non-repudiation can be violated. This requirement supports audit requirements that provide organizational personnel with the means to identify who produced specific information in the event of an information transfer. Organizations and/or data owners determine and approve the strength of the binding between the information producer and the information based on the security category of the information and relevant risk factors. DNSSEC and TSIG/SIG(0) both use digital signatures to establish the identity of the producer of particular pieces of information.
STIG Date
Domain Name System (DNS) Security Requirements Guide 2015-01-05

Details

Check Text ( C-55597r1_chk )
Review the DNS server implementation configuration to determine if the DNS server strongly binds the identity of the DNS server with the DNS information. Examples include enabling DNSSEC and enabling TSIG or SIG(0). If the DNS server does not strongly bind the identity of the DNS server with the DNS information, this is a finding.
Fix Text (F-59833r1_fix)
Configure the DNS server to strongly bind the identity of the DNS server with the DNS information.