Infoblox 8.x DNS Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000268-DNS-000039
<GroupDescription></GroupDescription>Group -
The Infoblox system must notify the system administrator when a component failure is detected.
<VulnDiscussion>Predictable failure prevention requires organizational planning to address system failure issues. If components key to mainta...Rule Medium Severity -
SRG-APP-000451-DNS-000069
<GroupDescription></GroupDescription>Group -
The Infoblox DNS server implementation must follow procedures to re-role a secondary name server as the master name server should the master name server permanently lose functionality.
<VulnDiscussion>Failing to an unsecure condition negatively impacts application security and can lead to system compromise. Failure condition...Rule Medium Severity -
SRG-APP-000142-DNS-000014
<GroupDescription></GroupDescription>Group -
The Infoblox system must prohibit or restrict unapproved services, ports, and protocols.
<VulnDiscussion>To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...Rule Medium Severity -
SRG-APP-000390-DNS-000048
<GroupDescription></GroupDescription>Group -
The Infoblox system must require devices to reauthenticate for each zone transfer and dynamic update request connection attempt.
<VulnDiscussion>Without reauthenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity....Rule Medium Severity -
SRG-APP-000158-DNS-000015
<GroupDescription></GroupDescription>Group -
When using non-Grid DNS servers for zone transfers, each name server must use TSIG to uniquely identify the other server.
<VulnDiscussion>Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. This...Rule Medium Severity -
SRG-APP-000394-DNS-000049
<GroupDescription></GroupDescription>Group -
The Infoblox DNS server must authenticate to any external (non-Grid) DNS servers before responding to a server-to-server transaction.
<VulnDiscussion>Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. D...Rule Medium Severity -
SRG-APP-000395-DNS-000050
<GroupDescription></GroupDescription>Group -
The Infoblox DNS server must authenticate another DNS server before establishing a remote and/or network connection using bidirectional authentication that is cryptographically based.
<VulnDiscussion>Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. B...Rule Medium Severity -
SRG-APP-000176-DNS-000076
<GroupDescription></GroupDescription>Group -
Infoblox systems that communicate with non-Grid name servers must use a unique Transaction Signature (TSIG).
<VulnDiscussion>To enable zone transfer (requests and responses) through authenticated messages, it is necessary to generate a key for every ...Rule Medium Severity -
SRG-APP-000176-DNS-000094
<GroupDescription></GroupDescription>Group -
The Infoblox Grid Master must be configured as a stealth (hidden) domain name server in order to protect the Key Signing Key (KSK) residing on it.
<VulnDiscussion>The private keys in the Key Signing Key (KSK) and ZSK key pairs must be protected from unauthorized access. If possible, the ...Rule High Severity -
SRG-APP-000176-DNS-000096
<GroupDescription></GroupDescription>Group -
The Infoblox Grid Master must be configured as a stealth (hidden) domain name server in order to protect the Zone Signing Key (ZSK) residing on it.
<VulnDiscussion>Security-relevant information is any information within information systems that can potentially impact the operation of secu...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.