Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000516-DNS-000114

    <GroupDescription></GroupDescription>
    Group
  • CNAME records must not point to a zone with lesser security for more than six months.

    &lt;VulnDiscussion&gt;The use of CNAME records for exercises, tests, or zone-spanning aliases should be temporary (e.g., to facilitate a migration)...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000500

    <GroupDescription></GroupDescription>
    Group
  • The Infoblox system must use the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.

    &lt;VulnDiscussion&gt;Configuration settings are the set of parameters that can be changed that affect the security posture and/or functionality of...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000500

    <GroupDescription></GroupDescription>
    Group
  • A secure out-of-band (OOB) network must be used for management of Infoblox Grid Members.

    &lt;VulnDiscussion&gt;The Infoblox Grid Master is the central point of management within an Infoblox Grid. The Grid Master retains a full copy of t...
    Rule High Severity
  • SRG-APP-000516-DNS-000500

    <GroupDescription></GroupDescription>
    Group
  • Infoblox systems must enforce current DoD password restrictions.

    &lt;VulnDiscussion&gt;The Infoblox systems must be configured to meet current DoD password policy when using the Infoblox Local User Database as th...
    Rule High Severity
  • SRG-APP-000516-DNS-000500

    <GroupDescription></GroupDescription>
    Group
  • Infoblox Grid configuration must be backed up on a regular basis.

    &lt;VulnDiscussion&gt;The Infoblox Grid Master is the central point of management within an Infoblox Grid. The Grid Master retains a full copy of t...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000500

    <GroupDescription></GroupDescription>
    Group
  • The Infoblox system must display the approved DoD notice and consent banner.

    &lt;VulnDiscussion&gt;Configuration of the DoD notice and consent banner requires all administrators to acknowledge the current DoD notice and cons...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000500

    <GroupDescription></GroupDescription>
    Group
  • The Infoblox system must display the appropriate security classification information.

    &lt;VulnDiscussion&gt;Configuration of the informational banner displays the security classification of the Infoblox system using both color and te...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000500

    <GroupDescription></GroupDescription>
    Group
  • The Infoblox system must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.

    &lt;VulnDiscussion&gt;Configuration settings are the set of parameters that can be changed that affect the security posture and/or functionality of...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000500

    <GroupDescription></GroupDescription>
    Group
  • The Infoblox system must present only approved TLS and SSL cipher suites.

    &lt;VulnDiscussion&gt;Infoblox systems ship with a wide range of cipher suites to support management in a variety of customer environments. Infoblo...
    Rule Medium Severity
  • SRG-APP-000347-DNS-000041

    <GroupDescription></GroupDescription>
    Group
  • An Infoblox DNS server must strongly bind the identity of the DNS server with the DNS information using DNSSEC.

    &lt;VulnDiscussion&gt;Weakly bound credentials can be modified without invalidating the credential; therefore, non-repudiation can be violated. Th...
    Rule Medium Severity
  • SRG-APP-000348-DNS-000042

    <GroupDescription></GroupDescription>
    Group
  • The Infoblox system must provide the means for authorized individuals to determine the identity of the source of the DNS server-provided information.

    &lt;VulnDiscussion&gt;Without a means for identifying the individual who produced the information, the information cannot be relied on. Identifying...
    Rule Medium Severity
  • SRG-APP-000349-DNS-000043

    <GroupDescription></GroupDescription>
    Group
  • The Infoblox system must validate the binding of the other DNS servers' identity to the DNS information for a server-to-server transaction (e.g., zone transfer).

    &lt;VulnDiscussion&gt;Validation of the binding of the information prevents the modification of information between production and review. The vali...
    Rule Medium Severity
  • SRG-APP-000350-DNS-000044

    <GroupDescription></GroupDescription>
    Group
  • The Infoblox system must send a notification in the event of an error when validating the binding of another DNS server’s identity to the DNS information.

    &lt;VulnDiscussion&gt;Failing to act on validation errors may result in the use of invalid, corrupted, or compromised information. The validation o...
    Rule Medium Severity
  • SRG-APP-000420-DNS-000053

    <GroupDescription></GroupDescription>
    Group
  • The Infoblox DNS server must provide data origin artifacts for internal name/address resolution queries.

    &lt;VulnDiscussion&gt;The major threat associated with DNS forged responses or failures is the integrity of the DNS data returned in the response. ...
    Rule Medium Severity
  • SRG-APP-000421-DNS-000054

    <GroupDescription></GroupDescription>
    Group
  • The Infoblox DNS server must provide data integrity protection artifacts for internal name/address resolution queries.

    &lt;VulnDiscussion&gt;The major threat associated with DNS forged responses or failures is the integrity of the DNS data returned in the response. ...
    Rule Medium Severity
  • SRG-APP-000268-DNS-000039

    <GroupDescription></GroupDescription>
    Group
  • The Infoblox system must notify the system administrator when a component failure is detected.

    &lt;VulnDiscussion&gt;Predictable failure prevention requires organizational planning to address system failure issues. If components key to mainta...
    Rule Medium Severity
  • SRG-APP-000451-DNS-000069

    <GroupDescription></GroupDescription>
    Group
  • The Infoblox DNS server implementation must follow procedures to re-role a secondary name server as the master name server should the master name server permanently lose functionality.

    &lt;VulnDiscussion&gt;Failing to an unsecure condition negatively impacts application security and can lead to system compromise. Failure condition...
    Rule Medium Severity
  • SRG-APP-000142-DNS-000014

    <GroupDescription></GroupDescription>
    Group
  • The Infoblox system must prohibit or restrict unapproved services, ports, and protocols.

    &lt;VulnDiscussion&gt;To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...
    Rule Medium Severity
  • SRG-APP-000390-DNS-000048

    <GroupDescription></GroupDescription>
    Group
  • The Infoblox system must require devices to reauthenticate for each zone transfer and dynamic update request connection attempt.

    &lt;VulnDiscussion&gt;Without reauthenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity....
    Rule Medium Severity
  • SRG-APP-000158-DNS-000015

    <GroupDescription></GroupDescription>
    Group
  • When using non-Grid DNS servers for zone transfers, each name server must use TSIG to uniquely identify the other server.

    &lt;VulnDiscussion&gt;Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. This...
    Rule Medium Severity
  • SRG-APP-000394-DNS-000049

    <GroupDescription></GroupDescription>
    Group
  • The Infoblox DNS server must authenticate to any external (non-Grid) DNS servers before responding to a server-to-server transaction.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. D...
    Rule Medium Severity
  • SRG-APP-000395-DNS-000050

    <GroupDescription></GroupDescription>
    Group
  • The Infoblox DNS server must authenticate another DNS server before establishing a remote and/or network connection using bidirectional authentication that is cryptographically based.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. B...
    Rule Medium Severity
  • SRG-APP-000176-DNS-000076

    <GroupDescription></GroupDescription>
    Group
  • Infoblox systems that communicate with non-Grid name servers must use a unique Transaction Signature (TSIG).

    &lt;VulnDiscussion&gt;To enable zone transfer (requests and responses) through authenticated messages, it is necessary to generate a key for every ...
    Rule Medium Severity
  • SRG-APP-000176-DNS-000094

    <GroupDescription></GroupDescription>
    Group
  • The Infoblox Grid Master must be configured as a stealth (hidden) domain name server in order to protect the Key Signing Key (KSK) residing on it.

    &lt;VulnDiscussion&gt;The private keys in the Key Signing Key (KSK) and ZSK key pairs must be protected from unauthorized access. If possible, the ...
    Rule High Severity
  • SRG-APP-000176-DNS-000096

    <GroupDescription></GroupDescription>
    Group
  • The Infoblox Grid Master must be configured as a stealth (hidden) domain name server in order to protect the Zone Signing Key (ZSK) residing on it.

    &lt;VulnDiscussion&gt;Security-relevant information is any information within information systems that can potentially impact the operation of secu...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules