Insights to Control Framework Mapping: DNS Configurations Ingrid Refer to the following DNS Configurations insights and assessments and how they're mapped to CIS v7 and CIS v8 controls for Control Insights: No DNS Security Configuration Issues The lack DNS Security configuration issues indicates effective control and secure server configurations The ratio of events of type [DNSSEC Configuration Issues] by type [DNSSEC Configuration Issues, DNSSEC Good Record] is below 10.0% Assessment Positive Observations DNSSEC CIS v8 Controls CIS v7 Controls Controls 4 Secure Configuration of Enterprise Assets and Software Safeguards 4.1 Establish and Maintain a Secure Configuration Process 4.10 Enforce Automatic Device Lockout on Portable End-User Devices 4.9 Configure Trusted DNS Servers on Enterprise Assets Controls 5 Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers Safeguards 5.1 Establish Secure Configurations 5.2 Maintain Secure Images 5.4 Deploy System Configuration Management Tools 5.5 Implement Automated Configuration Monitoring Systems DNS Configuration Issues The presence of DNS configuration issues indicates ineffective control and insecure server configurations. The ratio of events of type [DNSSEC Configuration Issues] by type [DNSSEC Configuration Issues, DNSSEC Good Record] is above 20.0% Assessment Negative Observations DNSSEC CIS v8 Controls CIS v7 Controls Controls 4 Secure Configuration of Enterprise Assets and Software Safeguards 4.1 Establish and Maintain a Secure Configuration Process 4.10 Enforce Automatic Device Lockout on Portable End-User Devices 4.9 Configure Trusted DNS Servers on Enterprise Assets Controls 5 Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers Safeguards 5.1 Establish Secure Configurations 5.2 Maintain Secure Images 5.4 Deploy System Configuration Management Tools 5.5 Implement Automated Configuration Monitoring Systems April 3, 2025: Published. Related articles Finding Behavior Industries Guest Network and Honeypot Exclusion Data Feed: Operational Technology Protocol Exposure Intelligence Updating IP Registration Feedback 0 comments Please sign in to leave a comment.