STIGQter STIGQter: STIG Summary: Domain Name System (DNS) Security Requirements Guide Version: 2 Release: 4 Benchmark Date: 23 Oct 2015:

The platform on which the name server software is hosted must be configured to respond to DNS traffic only.

DISA Rule

SV-69201r1_rule

Vulnerability Number

V-54955

Group Title

SRG-APP-000516-DNS-000109

Rule Version

SRG-APP-000516-DNS-000109

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the DNS name server to only respond to incoming 53/udp and 53/tcp and any other ports and protocols required for the underlying platform to function normally, as specified by the related OS STIG.

Check Contents

Review the name server configuration. Verify the server is configured to only respond to incoming 53/udp and 53/tcp and any other ports and protocols required for the underlying platform to function normally, as specified by the related OS STIG.

If the DNS server is not configured to only respond to incoming 53/udp and 53/tcp and any other ports and protocols required for the underlying platform to function normally, as specified by the related OS STIG, this is a finding.

Vulnerability Number

V-54955

Documentable

False

Rule Version

SRG-APP-000516-DNS-000109

Severity Override Guidance

Review the name server configuration. Verify the server is configured to only respond to incoming 53/udp and 53/tcp and any other ports and protocols required for the underlying platform to function normally, as specified by the related OS STIG.

If the DNS server is not configured to only respond to incoming 53/udp and 53/tcp and any other ports and protocols required for the underlying platform to function normally, as specified by the related OS STIG, this is a finding.

Check Content Reference

M

Target Key

2355

Comments