STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Domain Name System (DNS) Security Requirements Guide

V-205171

CAT II (Medium)

The key file must be owned by the account under which the name server software is run.

Rule ID

SV-205171r961041_rule

STIG

Domain Name System (DNS) Security Requirements Guide

Version

V4R2

CCIs

CCI-000186

Discussion

To enable zone transfer (requests and responses) through authenticated messages, it is necessary to generate a key for every pair of name servers. The key can also be used for securing other transactions, such as dynamic updates, DNS queries, and responses. The binary key string that is generated by most key generation utilities used with DNSSEC is Base64-encoded. TSIG is a string used to generate the message authentication hash stored in a TSIG RR and used to authenticate an entire DNS message.

Check Content

Review the DNS system to determine ownership of the key file and the account under which the name server software is run.

If the key file owner is not the same account as the account under which the name server is run, this is a finding.

Fix Text

Change ownership for the key file to the account under which the name server software is run.