The DNS server implementation must disable accounts when the accounts are no longer associated to a user.


Overview

Finding ID Version Rule ID IA Controls Severity
V-263624 SRG-APP-000705-DNS-000110 SV-263624r982034_rule Medium
Description
Disabling expired, inactive, or otherwise anomalous accounts supports the concepts of least privilege and least functionality, which reduce the attack surface of the system.
STIG Date
Domain Name System (DNS) Security Requirements Guide 2024-07-02

Details

Check Text ( C-67524r982032_chk )
Verify the DNS server implementation is configured to disable accounts when the accounts are no longer associated to a user.

If the DNS server implementation is not configured to disable accounts when the accounts are no longer associated to a user, this is a finding.
Fix Text (F-67432r982033_fix)
Configure the DNS server implementation to disable accounts when the accounts are no longer associated to a user.