Skip to content

Infoblox 7.x DNS Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000516-DNS-000500

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must maintain the integrity of information during reception.

    &lt;VulnDiscussion&gt;Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, duri...
    Rule Medium Severity
  • SRG-APP-000451-DNS-000069

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must follow procedures to re-role a secondary name server as the master name server should the master name server permanently lose functionality.

    &lt;VulnDiscussion&gt;Failing to an unsecure condition negatively impacts application security and can lead to system compromise. Failure condition...
    Rule Medium Severity
  • SRG-APP-000474-DNS-000073

    <GroupDescription></GroupDescription>
    Group
  • The DNS server implementation must log the event and notify the system administrator when anomalies in the operation of the signed zone transfers are discovered.

    &lt;VulnDiscussion&gt;Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing t...
    Rule Medium Severity
  • SRG-APP-000514-DNS-000075

    <GroupDescription></GroupDescription>
    Group
  • The DNS server must implement NIST FIPS-validated cryptography for provisioning digital signatures, generating cryptographic hashes, and protecting unclassified information requiring confidentiality.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The applicatio...
    Rule High Severity
  • SRG-APP-000516-DNS-000078

    <GroupDescription></GroupDescription>
    Group
  • The Zone Signing Key (ZSK) rollover interval must be configured to less than two months.

    &lt;VulnDiscussion&gt;An attacker that has compromised a ZSK can use that key only during the KSK's signature validity interval. An attacker that h...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules