DoD STIGs – V-32516

Overview:

Title: The application must provide additional data origin and integrity artifacts along with the authoritative data the system returns in response to name/address resolution queries.

Vulnerability ID: V-32516

STIG ID:

IA Controls: None

Severity: medium

Description: This control enables remote clients to obtain origin authentication and integrity verification assurances for the host/service name to network address resolution information obtained through the service.

A Domain Name System (DNS) server is an example of an information system providing name/address resolution service. Digital signatures and cryptographic keys are examples of additional artifacts. DNS resource records are examples of authoritative data.

Information systems using technologies other than the DNS to map between host/service names and network addresses provide other means to assure the authenticity and integrity of response data. The DNS security controls are consistent with, and referenced from, OMB Memorandum 08-23.

This requirement is specific to DNS servers. This requirement is NA for database.

Check Text: This check is NA for databases.

Fix Text: This fix is NA for databases.

[divider]

Interpreting V-32516:

As noted, this does not apply to SQL Server as it does not provide origin authentication and integrity verification assurances.

Return to the DoD STIGs – Database Security Requirements Guide

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.