The DNS server implementation must disable accounts when the accounts are no longer associated to a user.

Overview

Finding IDVersionRule IDIA ControlsSeverity
V-263624SRG-APP-000705-DNS-000110SV-263624r982034_ruleCCI-003628medium
Description
Disabling expired, inactive, or otherwise anomalous accounts supports the concepts of least privilege and least functionality, which reduce the attack surface of the system.
STIGDate
Domain Name System (DNS) Security Requirements Guide2024-07-02

Details

Check Text (C-263624r982034_chk)

Verify the DNS server implementation is configured to disable accounts when the accounts are no longer associated to a user. If the DNS server implementation is not configured to disable accounts when the accounts are no longer associated to a user, this is a finding.

Fix Text (F-67432r982033_fix)

Configure the DNS server implementation to disable accounts when the accounts are no longer associated to a user.