SV-207572r612253_rule
V-207572
SRG-APP-000516-DNS-000112
BIND-9X-001134
CAT II
10
Remove any ZSK or KSK private key from any BIND 9.x server that does not support dynamic updates.
Note: Any ZSK or KSK that is not needed to support dynamic updates should be stored offline in a secure location.
If the server is in a classified network, this is Not Applicable.
Determine if the BIND 9.x server is configured to allow dynamic updates.
Review the "named.conf" file for any instance of the "allow-update" statement. The following example disables dynamic updates:
allow-update {none;};
If the BIND 9.x implementation is not configured to allow dynamic updates, verify with the SA that the private ZSKs and private KSKs are stored offline, if not, this is a finding.
V-207572
False
BIND-9X-001134
If the server is in a classified network, this is Not Applicable.
Determine if the BIND 9.x server is configured to allow dynamic updates.
Review the "named.conf" file for any instance of the "allow-update" statement. The following example disables dynamic updates:
allow-update {none;};
If the BIND 9.x implementation is not configured to allow dynamic updates, verify with the SA that the private ZSKs and private KSKs are stored offline, if not, this is a finding.
M
2926