Details
DNS software administrators require DNS transaction logs for a wide variety of reasons including troubleshooting, intrusion detection, and forensics. Ensuring that the DNS transaction logs are recorded on the local system will provide the capability needed to support these actions.
Solution
Edit the ‘named.conf’ file and add the following:
logging {
channel local_file_channel {
file ‘path_name’ versions 3;
print-time yes;
print-severity yes;
print-category yes;
};
category category_name { local_file_channel; };
};
Restart the BIND 9.x process.
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability.This control applies to the following type of system Unix.
References
- 800-53|AU-9(2)
- CAT|III
- CCI|CCI-001348
- Rule-ID|SV-207547r744227_rule
- STIG-ID|BIND-9X-001041
- STIG-Legacy|SV-87017
- STIG-Legacy|V-72393
- Vuln-ID|V-207547