BIND-9X-001612 - On a BIND 9.x server all authoritative name servers for a zone must be located on different network segments.

Information

Most enterprises have an authoritative primary server and a host of authoritative secondary name servers. It is essential that these authoritative name servers for an enterprise be located on different network segments. This dispersion ensures the availability of an authoritative name server not only in situations in which a particular router or switch fails but also during events involving an attack on an entire network segment.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Edit the zone file and configure each name server on a separate network segment.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_BIND_9-x_V2R3_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-207595r879887_rule, STIG-ID|BIND-9X-001612, STIG-Legacy|SV-87131, STIG-Legacy|V-72507, Vuln-ID|V-207595

Plugin: Unix

Control ID: 4c3fbe2618b9963b8e2ca680a42a93c97798fe013eb44e5ed6f4182659f1c600