UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The DNS server implementation must produce audit records containing information to establish the source of the events.


Overview

Finding ID Version Rule ID IA Controls Severity
V-205164 SRG-APP-000098-DNS-000009 SV-205164r879566_rule Medium
Description
Without establishing the source of the event, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. Associating information about the source of the event within the application provides a means of investigating an attack, recognizing resource utilization or capacity thresholds, or identifying an improperly configured application. In addition to logging where events occur within the application, the application must also produce audit records that identify the application itself as the source of the event. In order to compile an accurate risk assessment and provide forensic analysis, it is essential for security personnel to know the source of the event, particularly in the case of centralized logging. In the case of centralized logging, the source would be the application name accompanied by the host or client name.
STIG Date
Domain Name System (DNS) Security Requirements Guide 2023-06-12

Details

Check Text ( C-5431r392408_chk )
Review the DNS server configuration to determine if the source of the events is a configurable option within the audit/logging utility and if it is being captured and stored.

If the DNS is not configured to capture and store the source of an event, this is a finding.
Fix Text (F-5431r392409_fix)
Configure the DNS server to produce log records which indicate the source of the events.

Additionally, configure the audit facility of the DNS system to provide information to establish the source of events.