Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000516-DNS-000101

    Group
  • The DNS implementation must implement internal/external role separation.

    DNS servers with an internal role only process name/address resolution requests from within the organization (i.e., internal clients). DNS servers with an external role only process name/address re...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000102

    Group
  • The Infoblox system must utilize valid root name servers in the local root zone file.

    All caching name servers must be authoritative for the root zone because, without this starting point, they would have no knowledge of the DNS infrastructure and thus would be unable to respond to ...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000103

    Group
  • The Infoblox NIOS version must be at the appropriate version.

    Infoblox NIOS is updated on a regular basis to add feature support, implement bug fixes, and address security vulnerabilities. NIOS is a hardened system with no direct user access to the software c...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000108

    Group
  • The IP address for hidden master authoritative name servers must not appear in the name servers set in the zone database.

    A hidden master authoritative server is an authoritative DNS server whose IP address does not appear in the name server set for a zone. All of the name servers that do appear in the zone database a...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000109

    Group
  • The platform on which the name server software is hosted must be configured to respond to DNS traffic only.

    OS configuration practices as issued by the US Computer Emergency Response Team (US CERT) and the National Institute of Standards and Technology's (NIST's) National Vulnerability Database (NVD), ba...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000110

    Group
  • The platform on which the name server software is hosted must be configured to send outgoing DNS messages from a random port.

    OS configuration practices as issued by the US Computer Emergency Response Team (US CERT) and the National Institute of Standards and Technology's (NIST's) National Vulnerability Database (NVD), ba...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000112

    Group
  • The private keys corresponding to both the ZSK and the KSK must not be kept on the DNSSEC-aware primary authoritative name server when the name server does not support dynamic updates.

    The private keys in the KSK and ZSK key pairs must be protected from unauthorized access. If possible, the private keys should be stored off-line (with respect to the Internet-facing, DNSSEC-aware ...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000114

    Group
  • CNAME records must not point to a zone with lesser security for more than six months.

    The use of CNAME records for exercises, tests, or zone-spanning aliases should be temporary (e.g., to facilitate a migration). When a host name is an alias for a record in another zone, an adversar...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000500

    Group
  • The Infoblox system must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.

    Configuration settings are the set of parameters that can be changed that affect the security posture and/or functionality of the system. Security-related parameters are those parameters impacting ...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000500

    Group
  • The Infoblox system must be configured to display the appropriate security classification information.

    Configuration of the informational banner displays the security classification of the Infoblox system using both color and text. Text may be added for additional security markings.
    Rule Low Severity
  • SRG-APP-000516-DNS-000500

    Group
  • The Infoblox system must be configured with the approved DoD notice and consent banner.

    Configuration of the DoD notice and consent banner requires all administrators to acknowledge the current DoD notice and consent by clicking an "Accept" button.
    Rule Low Severity
  • SRG-APP-000516-DNS-000500

    Group
  • Infoblox Grid configuration must be backed up on a regular basis.

    The Infoblox Grid Master is the central point of management within an Infoblox Grid. The Grid Master retains a full copy of the configuration used for the entire Grid. In the event of system failur...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000500

    Group
  • Infoblox systems must be configured with current DoD password restrictions.

    The Infoblox systems must be configured to meet current DoD password policy when using the Infoblox Local User Database as the authentication source.
    Rule High Severity
  • SRG-APP-000142-DNS-000014

    Group
  • The DHCP service must not be enabled on an external authoritative name server.

    The site DNS and DHCP architecture must be reviewed to ensure only the appropriate services are enabled on each Grid Member. An external authoritative name server must be configured to allow only a...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000500

    Group
  • A secure Out Of Band (OOB) network must be utilized for management of Infoblox Grid Members.

    The Infoblox Grid Master is the central point of management within an Infoblox Grid. The Grid Master retains a full copy of the configuration used for the entire Grid. The Grid Master should commun...
    Rule Medium Severity
  • SRG-APP-000516-DNS-000500

    Group
  • All authoritative name servers for a zone must be geographically disbursed.

    In addition to network-based dispersion, authoritative name servers should be dispersed geographically as well. In other words, in addition to being located on different network segments, the autho...
    Rule Medium Severity
  • SRG-APP-000001-DNS-000001

    Group
  • Infoblox systems which perform zone transfers to non-Infoblox Grid DNS servers must be configured to limit the number of concurrent sessions for zone transfers.

    Limiting the number of concurrent sessions reduces the risk of Denial of Service (DoS) to the DNS implementation. Infoblox DNS servers configured in a Grid do not utilize zone transfers; data is r...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules