Information
Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being performed on the system, where an event occurred, when an event occurred, and by whom the event was triggered to compile an accurate risk assessment. Logging the actions of specific events provides a means to investigate an attack, recognize resource utilization or capacity thresholds, or identify an improperly configured DNS system. If auditing is not comprehensive, it will not be useful for intrusion monitoring, security investigations, and forensic analysis.
The DNS server must audit all failed attempts at server authentication through DNSSEC and TSIG. The actual auditing is performed by the OS/NDM, but the configuration to trigger the auditing is controlled by the DNS server.
Failing to act on the validation errors may result in the use of invalid, corrupted, or compromised information. The validation of bindings can be achieved, for example, by the use of cryptographic checksums. Validations must be performed automatically.
The DNS server does not have the capability of shutting down or restarting the information system. The DNS server can be configured to generate audit records when anomalies are discovered.
Satisfies: SRG-APP-000350-DNS-000044, SRG-APP-000089-DNS-000005, SRG-APP-000504-DNS-000074, SRG-APP-000504-DNS-000082, SRG-APP-000474-DNS-000073
Solution
Edit the 'named.conf' file.
Add the 'severity' sub-statement to the 'channel' statement.
Configure the 'severity' sub-statement to 'info'.
Restart the BIND 9.x process.
Item Details
Category: AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY
References: 800-53|AU-10(2)(b), 800-53|AU-12a., 800-53|AU-12c., 800-53|CM-6b., 800-53|SI-6d., CAT|II, CCI|CCI-000169, CCI|CCI-000172, CCI|CCI-000366, CCI|CCI-001906, CCI|CCI-002702, Rule-ID|SV-272418r1124003_rule, STIG-ID|BIND-9X-001660, Vuln-ID|V-272418
Control ID: e4673bbdad006ea7d4918d1e36d62df5f84120e8477f40db9f55847fb561169d