UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The DNS server implementation must include only approved trust anchors in trust stores or certificate stores managed by the organization.


Overview

Finding ID Version Rule ID IA Controls Severity
V-263643 SRG-APP-000910-DNS-000300 SV-263643r982543_rule Medium
Description
Public key infrastructure (PKI) certificates are certificates with visibility external to organizational systems and certificates related to the internal operations of systems, such as application-specific time services. In cryptographic systems with a hierarchical structure, a trust anchor is an authoritative source (i.e., a certificate authority) for which trust is assumed and not derived. A root certificate for a PKI system is an example of a trust anchor. A trust store or certificate store maintains a list of trusted root certificates.
STIG Date
Domain Name System (DNS) Security Requirements Guide 2024-07-02

Details

Check Text ( C-67543r982542_chk )
Verify the DNS server implementation is configured to include only approved trust anchors in trust stores or certificate stores managed by the organization.

If the DNS server implementation is not configured to include only approved trust anchors in trust stores or certificate stores managed by the organization, this is a finding.
Fix Text (F-67451r982090_fix)
Configure the DNS server implementation to include only approved trust anchors in trust stores or certificate stores managed by the organization.