WDNS-SC-000004 - The Windows 2012 DNS Server must return data information in responses to internal name/address resolution queries.

Information

The major threat associated with DNS forged responses or failures is the integrity of the DNS data returned in the response. The principle of DNSSEC is to mitigate this threat by providing data origin authentication, establishing trust in the source. By requiring remote clients to obtain origin authentication and integrity verification assurances for the host/service name to network address resolution information obtained through the service, data origin is validated.

Solution

Sign, or re-sign, the hosted zone(s) on the DNS server being validated.

Log on to the Windows 2012 DNS server using the account designated as Administrator or DNS Administrator.

Press Windows Key + R, execute dnsmgmt.msc.

On the opened DNS Manager snap-in from the left pane, expand the server name for the DNS server, and then expand Forward Lookup Zones.

From the expanded list, right-click to select the zone (repeat for each hosted zone), point to DNSSEC, and then click Sign the Zone, either using approved saved parameters or approved custom parameters.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_2012_Server_DNS_V2R5_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|CM-6b., 800-53|SC-20(2), CAT|II, CCI|CCI-000366, CCI|CCI-002463, Rule-ID|SV-215612r561297_rule, STIG-ID|WDNS-SC-000004, STIG-Legacy|SV-73087, STIG-Legacy|V-58657, Vuln-ID|V-215612

Plugin: Windows

Control ID: f72016538df9a337f694c719411f111b1851ad199163629f73121f765f472297