Skip to content

Infoblox 7.x DNS Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000516-DNS-000084

    Group
  • SRG-APP-000516-DNS-000085

    Group
  • The Infoblox system must ensure each NS record in a zone file points to an active name server authoritative for the domain specified in that record.

    Poorly constructed NS records pose a security risk because they create conditions under which an adversary might be able to provide the missing authoritative name services that are improperly speci...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000087

    Group
  • All authoritative name servers for a zone must be located on different network segments.

    Most enterprises have an authoritative primary server and a host of authoritative secondary name servers. It is essential that these authoritative name servers for an enterprise be located on diffe...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000089

    Group
  • An authoritative name server must be configured to enable DNSSEC Resource Records.

    The specification for a digital signature mechanism in the context of the DNS infrastructure is in IETF's DNSSEC standard. In DNSSEC, trust in the public key (for signature verification) of the sou...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000090

    Group
  • SRG-APP-000516-DNS-000091

    Group
  • For zones split between the external and internal sides of a network, the RRs for the external hosts must be separate from the RRs for the internal hosts.

    Authoritative name servers for an enterprise may be configured to receive requests from both external and internal clients. External clients need to receive RRs that pertain only to public servic...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000092

    Group
  • SRG-APP-000516-DNS-000093

    Group
  • In a split DNS configuration, where separate name servers are used between the external and internal networks, the internal name server must be configured to not be reachable from outside resolvers.

    Instead of having the same set of authoritative name servers serve different types of clients, an enterprise could have two different sets of authoritative name servers. One set, called external ...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000099

    Group
  • The DNS implementation must enforce a Discretionary Access Control (DAC) policy that limits propagation of access rights.

    Discretionary Access Control (DAC) is based on the premise that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in whic...
    Rule Medium Severity
  • The platform on which the name server software is hosted must be configured to send outgoing DNS messages from a random port.

    OS configuration practices as issued by the US Computer Emergency Response Team (US CERT) and the National Institute of Standards and Technology's (NIST's) National Vulnerability Database (NVD), ba...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000112

    Group
  • SRG-APP-000516-DNS-000103

    Group
  • The Infoblox NIOS version must be at the appropriate version.

    Infoblox NIOS is updated on a regular basis to add feature support, implement bug fixes, and address security vulnerabilities. NIOS is a hardened system with no direct user access to the software c...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000108

    Group
  • The IP address for hidden master authoritative name servers must not appear in the name servers set in the zone database.

    A hidden master authoritative server is an authoritative DNS server whose IP address does not appear in the name server set for a zone. All of the name servers that do appear in the zone database a...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000109

    Group
  • SRG-APP-000516-DNS-000110

    Group
  • Infoblox Grid configuration must be backed up on a regular basis.

    The Infoblox Grid Master is the central point of management within an Infoblox Grid. The Grid Master retains a full copy of the configuration used for the entire Grid. In the event of system failur...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000500

    Group
  • SRG-APP-000516-DNS-000114

    Group
  • CNAME records must not point to a zone with lesser security for more than six months.

    The use of CNAME records for exercises, tests, or zone-spanning aliases should be temporary (e.g., to facilitate a migration). When a host name is an alias for a record in another zone, an adversar...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000500

    Group
  • The Infoblox system must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.

    Configuration settings are the set of parameters that can be changed that affect the security posture and/or functionality of the system. Security-related parameters are those parameters impacting ...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000500

    Group
  • The Infoblox system must be configured to display the appropriate security classification information.

    Configuration of the informational banner displays the security classification of the Infoblox system using both color and text. Text may be added for additional security markings.
    Rule Low Severity
  • SRG-APP-000516-DNS-000500

    Group
  • The Infoblox system must be configured with the approved DoD notice and consent banner.

    Configuration of the DoD notice and consent banner requires all administrators to acknowledge the current DoD notice and consent by clicking an "Accept" button.
    Rule Low Severity
  • SRG-APP-000516-DNS-000500

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules