Check: SRG-APP-000231-DNS-000033
Domain Name System (DNS) SRG:
SRG-APP-000231-DNS-000033
(in versions v4 r1 through v2 r4)
Title
The DNS server implementation must protect the confidentiality and integrity of secret/private cryptographic keys at rest and the integrity of DNS information at rest. (Cat II impact)
Discussion
Information at rest refers to the state of information when it is located on a secondary storage device within an organizational information system. Mobile devices, laptops, desktops, and storage devices can be either lost or stolen, and the contents of their data storage (e.g., hard drives and non-volatile memory) can be read, copied, or altered. Applications and application users generate information throughout the course of their application use. The DNS server must protect the confidentiality and integrity of shared keys (for TSIG) and private keys (for SIG(0)) and must protect the integrity of DNS information. There is no need to protect the confidentiality of DNS information because it is accessible by all devices that can contact the server.
Check Content
Review the DNS server implementation configuration to determine if the DNS server protects the confidentiality and integrity of secret/private cryptographic keys at rest and the integrity of DNS information at rest. If the DNS server does not properly protect confidentiality and integrity, this is a finding.
Fix Text
Configure the DNS server to protect the confidentiality and integrity of secret/private cryptographic keys at rest and the integrity of DNS information at rest.
Additional Identifiers
Rule ID: SV-205187r961128_rule
Vulnerability ID: V-205187
Group Title: SRG-APP-000231
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001199 |
Protects the confidentiality and/or integrity of organization-defined information at rest. |
Controls
Number | Title |
---|---|
SC-28 |
Protection of Information at Rest |