U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CIS ISC BIND DNS Server 9.9 Benchmark 3.0.1 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
ISC BIND 9.9 cpe:/a:isc:bind:9.9 (View CVEs)

Checklist Highlights

Checklist Name:
CIS ISC BIND DNS Server 9.9 Benchmark
Checklist ID:
720
Version:
3.0.1
Type:
Compliance
Review Status:
Final
Authority:
Third Party: Center for Internet Security (CIS)
Original Publication Date:
07/10/2017

Checklist Summary:

This document, CIS ISC BIND DNS Server Benchmark, provides prescriptive guidance for establishing a secure configuration posture for the ISC BIND DNS Server versions 9.9 running on Linux. This guide was tested using BIND version 9.9.4 installed from rpm packages on CentOS Linux 7.2. To obtain the latest version of this guide, please visit http://benchmarks.cisecurity.org. If you have questions, comments, or have identified ways to improve this guide, please write us at feedback@cisecurity.org.

Checklist Role:

  • Domain Name Server
  • DNS Server

Known Issues:

Not provided.

Target Audience:

This document is intended for system and application administrators, security specialists, auditors, help desk, and platform deployment personnel who plan to develop, deploy, assess, or secure solutions that incorporate ISC (Internet Systems Consortium) BIND (Berkeley Internet Name Domain) DNS Server 9.9 running on Linux.

Target Operational Environment:

  • Managed

Testing Information:

This guide was tested using BIND version 9.9.4 installed from rpm packages on CentOS Linux 7.2.

Regulatory Compliance:

Not provided.

Comments/Warnings/Miscellaneous:

Not provided.

Disclaimer:

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International Public License. The link to the license terms can be found at https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode To further clarify the Creative Commons license related to CIS Benchmark content, you are authorized to copy and redistribute the content for use by you, within your organization and outside your organization for non-commercial purposes only, provided that (i) appropriate credit is given to CIS, (ii) a link to the license is provided. Additionally, if you remix, transform or build upon the CIS Benchmark(s), you may only distribute the modified materials if they are subject to the same license terms as the original Benchmark license and your derivative will no longer be a CIS Benchmark. Commercial use of CIS Benchmarks is subject to the prior approval of the Center for Internet Security.

Product Support:

Not provided.

Point of Contact:

feedback@cisecurity.org

Sponsor:

feedback@cisecurity.org

Licensing:

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International Public License. The link to the license terms can be found at https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode To further clarify the Creative Commons license related to CIS Benchmark content, you are authorized to copy and redistribute the content for use by you, within your organization and outside your organization for non-commercial purposes only, provided that (i) appropriate credit is given to CIS, (ii) a link to the license is provided. Additionally, if you remix, transform or build upon the CIS Benchmark(s), you may only distribute the modified materials if they are subject to the same license terms as the original Benchmark license and your derivative will no longer be a CIS Benchmark. Commercial use of CIS Benchmarks is subject to the prior approval of the Center for Internet Security.

Change History:

Move to FINAL - 1/19/2017
Updated to UNDER REVIEW - 07/13/2017
Updated - UNDER REVIEW to FINAL - 08/16/2017
corrected title - 8/13/19
updated URL - 2/11/2022
updated SHA - 4/27/2022

Dependency/Requirements:

URL Description

References:

Reference URL Description

NIST checklist record last modified on 04/27/2022