Ensure that Domain Name System Security Extensions (DNSSEC) feature is not using the deprecated RSASHA1 algorithm for the Key-Signing Key (KSK) associated with your DNS managed zone file.
This rule resolution is part of the Conformity Security & Compliance tool for GCP.
When enabling DNSSEC security feature for a managed DNS zone, or creating a managed zone with DNSSEC, you can select the DNSSEC signing algorithms and the denial-of-existence type. To follow security best practices, do not use the RSASHA1 signature algorithm for DNSSEC signing unless it is required for compatibility reasons, as SHA1 is considered weak and vulnerable to collision attacks. The algorithm used for DNSSEC signing should be a strong one, such as ECDSAP256SHA256 algorithm, as this is secure and widely deployed, and therefore it is a good choice for both DNSSEC validation and signing.
Note: This rule assumes that the DNSSEC feature is enabled for all your Google Cloud DNS managed zones, otherwise see the steps outlined in this conformity rule to enable DNSSEC.
Audit
To determine the type of DNSSEC Key-Signing Key algorithm configured for your Domain Name System (DNS) managed zones, perform the following operations:
Remediation / Resolution
To reconfigure the Key-Signing Key (KSK) algorithm used by the DNSSEC security feature, perform the following operations:
Note: Changing the DNSSEC Key-Signing Key (KSK) algorithm using the Google Cloud Console is not currently supported.References
- Google Cloud Platform (GCP) Documentation
- DNS Security Extensions (DNSSEC) overview
- Manage DNSSEC configuration
- Use advanced DNSSEC
- View DNSSEC keys
- CIS Security Documentation
- Securing Google Cloud Computing Platform
- GCP Command Line Interface (CLI) Documentation
- gcloud projects list
- gcloud dns managed-zones list
- gcloud dns managed-zones describe
- gcloud dns managed-zones update