Check: SRG-APP-000347-DNS-000041
Domain Name System (DNS) SRG:
SRG-APP-000347-DNS-000041
(in versions v3 r2 through v2 r4)
Title
The DNS server implementation must strongly bind the identity of the DNS server with the DNS information. (Cat II impact)
Discussion
Weakly bound credentials can be modified without invalidating the credential; therefore, non-repudiation can be violated. This requirement supports audit requirements that provide organizational personnel with the means to identify who produced specific information in the event of an information transfer. Organizations and/or data owners determine and approve the strength of the binding between the information producer and the information based on the security category of the information and relevant risk factors. DNSSEC and TSIG/SIG(0) both use digital signatures to establish the identity of the producer of particular pieces of information.
Check Content
Review the DNS server implementation configuration to determine if the DNS server strongly binds the identity of the DNS server with the DNS information. Examples include enabling DNSSEC and enabling TSIG or SIG(0). If the DNS server does not strongly bind the identity of the DNS server with the DNS information, this is a finding.
Fix Text
Configure the DNS server to strongly bind the identity of the DNS server with the DNS information.
Additional Identifiers
Rule ID: SV-205196r879724_rule
Vulnerability ID: V-205196
Group Title: SRG-APP-000347
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
CCI-001901 |
The information system binds the identity of the information producer with the information to an organization-defined strength of binding. |