Skip to content

Infoblox 7.x DNS Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000516-DNS-000091

    <GroupDescription></GroupDescription>
    Group
  • For zones split between the external and internal sides of a network, the RRs for the external hosts must be separate from the RRs for the internal hosts.

    &lt;VulnDiscussion&gt;Authoritative name servers for an enterprise may be configured to receive requests from both external and internal clients. ...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000092

    <GroupDescription></GroupDescription>
    Group
  • In a split DNS configuration, where separate name servers are used between the external and internal networks, the external name server must be configured to not be reachable from inside resolvers.

    &lt;VulnDiscussion&gt;Instead of having the same set of authoritative name servers serve different types of clients, an enterprise could have two d...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000093

    <GroupDescription></GroupDescription>
    Group
  • In a split DNS configuration, where separate name servers are used between the external and internal networks, the internal name server must be configured to not be reachable from outside resolvers.

    &lt;VulnDiscussion&gt;Instead of having the same set of authoritative name servers serve different types of clients, an enterprise could have two d...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000099

    <GroupDescription></GroupDescription>
    Group
  • The DNS implementation must implement internal/external role separation.

    &lt;VulnDiscussion&gt;DNS servers with an internal role only process name/address resolution requests from within the organization (i.e., internal ...
    Rule Medium Severity
  • The DNS implementation must enforce a Discretionary Access Control (DAC) policy that limits propagation of access rights.

    &lt;VulnDiscussion&gt;Discretionary Access Control (DAC) is based on the premise that individual users are "owners" of objects and therefore have d...
    Rule Medium Severity
  • The platform on which the name server software is hosted must be configured to send outgoing DNS messages from a random port.

    &lt;VulnDiscussion&gt;OS configuration practices as issued by the US Computer Emergency Response Team (US CERT) and the National Institute of Stand...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000112

    <GroupDescription></GroupDescription>
    Group
  • The Infoblox system must utilize valid root name servers in the local root zone file.

    &lt;VulnDiscussion&gt;All caching name servers must be authoritative for the root zone because, without this starting point, they would have no kno...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000103

    <GroupDescription></GroupDescription>
    Group
  • The Infoblox NIOS version must be at the appropriate version.

    &lt;VulnDiscussion&gt;Infoblox NIOS is updated on a regular basis to add feature support, implement bug fixes, and address security vulnerabilities...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000108

    <GroupDescription></GroupDescription>
    Group
  • The IP address for hidden master authoritative name servers must not appear in the name servers set in the zone database.

    &lt;VulnDiscussion&gt;A hidden master authoritative server is an authoritative DNS server whose IP address does not appear in the name server set f...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000109

    <GroupDescription></GroupDescription>
    Group
  • The platform on which the name server software is hosted must be configured to respond to DNS traffic only.

    &lt;VulnDiscussion&gt;OS configuration practices as issued by the US Computer Emergency Response Team (US CERT) and the National Institute of Stand...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000110

    <GroupDescription></GroupDescription>
    Group
  • Infoblox Grid configuration must be backed up on a regular basis.

    &lt;VulnDiscussion&gt;The Infoblox Grid Master is the central point of management within an Infoblox Grid. The Grid Master retains a full copy of t...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules