WDNS-SC-000024 - The Windows 2012 DNS Server must protect secret/private cryptographic keys while at rest.

Information

Information at rest refers to the state of information when it is located on a secondary storage device within an organizational information system. Mobile devices, laptops, desktops, and storage devices can be either lost or stolen, and the contents of their data storage (e.g., hard drives and non-volatile memory) can be read, copied, or altered. Applications and application users generate information throughout the course of their application use.

The DNS server must protect the confidentiality and integrity of shared keys (for TSIG) and private keys (for SIG(0)) and must protect the integrity of DNS information. There is no need to protect the confidentiality of DNS information because it is accessible by all devices that can contact the server.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

To ensure the cryptographic keys are protected after being backed up to tape or other medium, develop a backup policy to include the protection of backup date to be at or above the same level as the DNS server itself.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_2012_Server_DNS_V2R5_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-28, CAT|II, CCI|CCI-001199, Rule-ID|SV-215630r561297_rule, STIG-ID|WDNS-SC-000024, STIG-Legacy|SV-73123, STIG-Legacy|V-58693, Vuln-ID|V-215630

Plugin: Windows

Control ID: bfd5cbcfc5a4b10f6c539e348fc25f4eb3f7bc8698b0a4180ee0b1c808c58e47