Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000516-DNS-000103

    <GroupDescription></GroupDescription>
    Group
  • The Infoblox NIOS version must be at the appropriate version.

    &lt;VulnDiscussion&gt;Each newer version of the name server software, especially the BIND software, generally is devoid of vulnerabilities found in...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000108

    <GroupDescription></GroupDescription>
    Group
  • The IP address for hidden master authoritative name servers must not appear in the name servers set in the zone database.

    &lt;VulnDiscussion&gt;A hidden master authoritative server is an authoritative DNS server in which the IP address does not appear in the name serve...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000109

    <GroupDescription></GroupDescription>
    Group
  • The Infoblox system must be configured to respond to DNS traffic only.

    &lt;VulnDiscussion&gt;OS configuration practices as issued by the US Computer Emergency Response Team (US CERT) and the National Institute of Stand...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000110

    <GroupDescription></GroupDescription>
    Group
  • The Infoblox DNS server must send outgoing DNS messages from a random port.

    &lt;VulnDiscussion&gt;OS configuration practices as issued by the US Computer Emergency Response Team (US CERT) and the National Institute of Stand...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000112

    <GroupDescription></GroupDescription>
    Group
  • The private keys corresponding to both the Zone Signing Key (ZSK) and the Key Signing Key (KSK) must not be kept on the DNSSEC-aware primary authoritative name server when the name server does not support dynamic updates.

    &lt;VulnDiscussion&gt;The private keys in the KSK and ZSK key pairs must be protected from unauthorized access. If possible, the private keys shoul...
    Rule High Severity
  • SRG-APP-000516-DNS-000114

    <GroupDescription></GroupDescription>
    Group
  • CNAME records must not point to a zone with lesser security for more than six months.

    &lt;VulnDiscussion&gt;The use of CNAME records for exercises, tests, or zone-spanning aliases should be temporary (e.g., to facilitate a migration)...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000500

    <GroupDescription></GroupDescription>
    Group
  • The Infoblox system must use the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.

    &lt;VulnDiscussion&gt;Configuration settings are the set of parameters that can be changed that affect the security posture and/or functionality of...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000500

    <GroupDescription></GroupDescription>
    Group
  • A secure out-of-band (OOB) network must be used for management of Infoblox Grid Members.

    &lt;VulnDiscussion&gt;The Infoblox Grid Master is the central point of management within an Infoblox Grid. The Grid Master retains a full copy of t...
    Rule High Severity
  • SRG-APP-000516-DNS-000500

    <GroupDescription></GroupDescription>
    Group
  • Infoblox systems must enforce current DoD password restrictions.

    &lt;VulnDiscussion&gt;The Infoblox systems must be configured to meet current DoD password policy when using the Infoblox Local User Database as th...
    Rule High Severity
  • SRG-APP-000516-DNS-000500

    <GroupDescription></GroupDescription>
    Group
  • Infoblox Grid configuration must be backed up on a regular basis.

    &lt;VulnDiscussion&gt;The Infoblox Grid Master is the central point of management within an Infoblox Grid. The Grid Master retains a full copy of t...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules