The DNS implementation must protect the authenticity of communications sessions for dynamic updates.

STIG ID: SRG-APP-000219-DNS-000029  |  SRG: SRG-APP-000219 |  Severity: medium (CAT II)  |  CCI: CCI-001184 |  Vulnerability Id: V-205183

Vulnerability Discussion

DNS is a fundamental network service that is prone to various attacks, such as cache poisoning and man-in-the middle attacks. If communication sessions are not provided appropriate validity protections, such as the employment of DNSSEC, the authenticity of the data cannot be guaranteed.

Check

Review the DNS server configuration to determine if communication sessions for dynamic updates are provided authenticity protection.

If communications sessions do not employ authenticity protections, this is a finding.

Fix

Configure the DNS server to employ mechanisms to protect the authenticity of communications sessions for dynamic updates.