II - Mission Support Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000347-DNS-000041
Group -
An Infoblox DNS server must strongly bind the identity of the DNS server with the DNS information using DNSSEC.
Weakly bound credentials can be modified without invalidating the credential; therefore, non-repudiation can be violated. This requirement supports audit requirements that provide organizational p...Rule Medium Severity -
SRG-APP-000348-DNS-000042
Group -
The Infoblox system must be configured to provide the means for authorized individuals to determine the identity of the source of the DNS server-provided information.
Without a means for identifying the individual that produced the information, the information cannot be relied upon. Identifying the validity of information may be delayed or deterred. This requir...Rule Medium Severity -
SRG-APP-000349-DNS-000043
Group -
The Infoblox system must be configured to validate the binding of the other DNS servers identity to the DNS information for a server-to-server transaction (e.g., zone transfer).
Validation of the binding of the information prevents the modification of information between production and review. The validation of bindings can be achieved, for example, by the use of cryptogra...Rule Medium Severity -
SRG-APP-000383-DNS-000047
Group -
Recursion must be disabled on Infoblox DNS servers which are configured as authoritative name servers.
A potential vulnerability of DNS is that an attacker can poison a name server's cache by sending queries that will cause the server to obtain host-to-IP address mappings from bogus name servers tha...Rule Medium Severity -
SRG-APP-000394-DNS-000049
Group -
The Infoblox system must authenticate the other DNS server before responding to a server-to-server transaction.
Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Device authentication is a solution enabling an organization to manage de...Rule Medium Severity -
SRG-APP-000395-DNS-000050
Group -
The DNS server implementation must authenticate another DNS server before establishing a remote and/or network connection using bidirectional authentication that is cryptographically based.
Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Bidirectional authentication provides stronger safeguards to validate the...Rule Medium Severity -
SRG-APP-000420-DNS-000053
Group -
A DNS server implementation must provide data origin artifacts for internal name/address resolution queries.
The major threat associated with DNS forged responses or failures is the integrity of the DNS data returned in the response. The principle of DNSSEC is to mitigate this threat by providing data ori...Rule Medium Severity -
SRG-APP-000421-DNS-000054
Group -
A DNS server implementation must provide data integrity protection artifacts for internal name/address resolution queries.
The major threat associated with DNS forged responses or failures is the integrity of the DNS data returned in the response. The principle of DNSSEC is to mitigate this threat by providing data ori...Rule Medium Severity -
SRG-APP-000422-DNS-000055
Group -
A DNS server implementation must provide additional integrity artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries.
The major threat associated with DNS forged responses or failures is the integrity of the DNS data returned in the response. The principle of DNSSEC is to mitigate this threat by providing data ori...Rule Medium Severity -
SRG-APP-000423-DNS-000056
Group -
A DNS server implementation must request data origin authentication verification on the name/address resolution responses the system receives from authoritative sources.
If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercep...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.