Windows Server 2012 Domain Name System (DNS) Security Technical Implementation Guide (STIG) Version 1

DISA has released the Windows Server 2012 DNS STIG Version 1. The
requirements of the STIG become effective immediately. The STIG is available
on IASE at:
http://iase.disa.mil/stigs/net_perimeter/network-other/Pages/network-other.a
spx.Windows-Server-2012-Domain-Name-System

VMS Users: The Windows 2012 Server DNS STIG requirements will need to be
manually applied to an asset in VMS by adding the “Windows 2012 DNS” element
(found under Computing>Application>DNS Applications) to the asset’s posture.

The “Windows DNS” element from the previous version DNS STIG will still
remain applied to the asset’s posture, along with the requirements related
to the previous version. That previous version element should be manually
removed from an asset’s posture once the assessment results from the
previous version are no longer needed.

About Bruce Brown

I have done a lot of work with Risk Management Framework for DoD IT (formerly DIACAP,DITSCAP). I noticed there was not a lot of information for security engineers on the nuts and bolts of it, so i started writing it down. security is just a hobby. my real job is to help humanity out of poverty (information & financial poverty). I am sure we can do it together maybe rmf will help humanity. ;p the internet maybe our greatest hope, we should keep it safe.

Leave a Reply