The CISCO Domain Name System (DNS) Security Technical Implementation Guide (STIG) is published as a tool for applying security measures to a CISCO device performing a DNS role.
Developed for the DOD. This checklist has been created for IT professionals, particularly network system administrators and information security personnel. The document assumes that the reader has experience installing and administering DNS Servers.
- Specialized Security-Limited Functionality (SSLF)
DoD Instruction (DoDI) 8500.01 requires that "all IT that receives, processes, stores, displays, or transmits DoD information will be […] configured […] consistent with applicable DoD cybersecurity policies, standards, and architectures" and tasks that Defense Information Systems Agency (DISA) "develops and maintains control correlation identifiers (CCIs), security requirements guides (SRGs), security technical implementation guides (STIGs), and mobile code risk categories and usage guides that implement and are consistent with DoD cybersecurity policies, standards, architectures, security controls, and validation procedures, with the support of the NSA/CSS, using input from stakeholders, and using automation whenever possible." This document is provided under the authority of DoDI 8500.01.
It should be noted that FSO Support for the STIGs, Checklists, and Tools is only available to DOD Customers.
Comments or proposed revisions to this document should be sent via email to the following address: firstname.lastname@example.org. DISA will coordinate all change requests with the relevant DoD organizations before inclusion in this document. Approved changes will be made in accordance with the DISA maintenance release schedule.
Moved to FINAL - 08/29/2017
moved to archive status - 4/15/19
Updated URLs - 6/5/19
Updated URLs - 9/11/19
NIST checklist record last modified on 09/11/2019