Check: DNS0170
DNS Policy:
DNS0170
(in versions v4 r1.22 through v4 r1.2)
Title
The underlying operating system of the DNS server is not in compliance with the appropriate OS STIG. (Cat II impact)
Discussion
A vulnerability in the underlying operating system of a DNS server could potentially impact not only the DNS server but the entire network infrastructure to include the Global Information Grid (GIG).
Check Content
Review the Operating System against the appropriate OS STIG. For a Windows system this would mean an evaluation with the Gold Disk; for a UNIX/LINUX system this would mean an evaluation using the SRR scripts. STIG compliance means that all findings are either closed, or there is a POA&M to address any outstanding vulnerabilities.
Fix Text
The underlying Operating System of the DNS server must be in compliance with the appropriate OS STIG.
Additional Identifiers
Rule ID: SV-13885r1_rule
Vulnerability ID: V-13313
Group Title: OS on DNS server not STIG compliant.
Expert Comments
CCIs
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Number | Title |
---|---|
No controls are assigned to this check |