Infoblox 7.x DNS Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 2
Comparison against the immediately-prior release (V1R6). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 2
- RMF Control
- AC-10
- Severity
- L
- CCI
- CCI-000054
- Version
- IDNS-7X-000010
- Vuln IDs
-
- V-68515
- Rule IDs
-
- SV-83005r1_rule
Checks: C-69047r1_chk
Verify inbound and outbound zone transfer limits are configured. These values control the amount of concurrent zone transfers to non-Grid DNS servers. Navigate to Data Management >> DNS >> Members/Servers tab. Review each server with the DNS service enabled. Select each server, click "Edit", toggle Advanced Mode and select General >> Advanced tab. Verify zone transfer limitations are configured. If all name servers for all zones utilize a single Infoblox Grid, zone data is transferred via the encrypted Infoblox Grid, this is not a finding. When complete, click "Cancel" to exit the "Properties" screen.
Fix: F-74631r1_fix
Navigate to Data Management >> DNS >> Members/Servers tab. Click "Edit" to review each member with the DNS service status of "Running". Toggle Advanced Mode and select General >> Advanced tab. Configure both inbound and outbound zone transfer to appropriate values. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000020
- Vuln IDs
-
- V-68517
- Rule IDs
-
- SV-83007r1_rule
Checks: C-69049r1_chk
Infoblox grid members do not utilize DNS zone transfers to exchange DNS data. Communication between grid members is via a distributed database over a secure Virtual Private Network (VPN). If configured to utilize zone transfers to external DNS servers, ensure Access Control Lists are configured to restrict data flow. If Access Controls Lists are not configured for zone transfers to external non-Grid servers, this is a finding.
Fix: F-74633r1_fix
Navigate to Data Management >> DNS >> Members/Servers tab and configure access control (ACL or ACE) on each grid member which communicates with an external secondary. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- IDNS-7X-000030
- Vuln IDs
-
- V-68519
- Rule IDs
-
- SV-83009r1_rule
Checks: C-69051r1_chk
Infoblox Systems can be configured in two ways to limit DDNS client updates. For clients that support GSS-TSIG, navigate to Data Management >> DNS >> Members/Servers tab. Review each server with the DNS service enabled. Select each server, click "Edit", toggle Advanced Mode and select GSS-TSIG. Verify that "Enable GSS-TSIG authentication of clients" is enabled. For clients that do not support GSS-TSIG, navigate to Data Management >> DNS >> Members/Servers tab. Review each server with the DNS service enabled. Select each server, click "Edit". Select the "Zone Transfers" tab. Verify that either a Named ACL or Set of ACEs are defined to limit client DDNS. When complete, click "Cancel" to exit the "Properties" screen. If "Enable GSS-TSIG authentication of clients" is disabled for clients supporting GSS-TSIG or a Named ACL or Set of ACEs are not defined to limit DDNS for clients without GSS-TSIG support, this is a finding.
Fix: F-74635r1_fix
Infoblox Systems can be configured in two ways to limit DDNS client updates. For clients that support GSS-TSIG, navigate to Data Management >> DNS >> Members/Servers tab. Review each server with the DNS service enabled. Select each server, click "Edit", toggle Advanced Mode and select GSS-TSIG. Configure the option "Enable GSS-TSIG authentication of clients". Upload the required keys. Refer to the Administration Guide for detailed instructions. For clients that do not support GSS-TSIG, navigate to Data Management >> DNS >> Members/Servers tab. Review each server with the DNS service enabled. Select each server, click "Edit". Select the Zone Transfers tab. Select either an existing Named ACL or configure a new Set of ACEs to limit client DDNS. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- IDNS-7X-000120
- Vuln IDs
-
- V-68521
- Rule IDs
-
- SV-83011r1_rule
Checks: C-69053r1_chk
Navigate to Grid >> Grid Manager >> Grid Properties >> Monitoring tab. If "Log to External Syslog Servers" is enabled, an External Syslog Server must be configured. If no external SYSLOG server is available verify local procedure to retain audit logs. Logs can be downloaded by navigation to Administration >> Logs >> Audit Log tab and pressing the "Download" button. When complete, click "Cancel" to exit the "Properties" screen. If neither an external SYSLOG server is configured, or a local policy is in place to store audit logs, this is a finding.
Fix: F-74637r1_fix
Navigate to Grid >> Grid Manager >> Grid Properties >> Monitoring tab. Enable "Log to External Syslog Servers" and configure an "External Syslog Server". Review Infoblox audit records on the remote SYSLOG server to validate operation. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- IDNS-7X-000130
- Vuln IDs
-
- V-68523
- Rule IDs
-
- SV-83013r3_rule
Checks: C-69055r7_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. By default all services other than those required for management are disabled. Validate that no additional services have been enabled for DNS members. Navigate to Grid >> Grid Manager >> Services tab and review each service and member status at the top of the panel. Depending upon purchased options, Infoblox DNS members may be running DNS, Reporting, Threat Protection, Threat Analytics, and TAXII services, this is not a finding. If any unnecessary services such as file distribution services are enabled on the DNS members, this is a finding. Note: Once DNSSEC is enabled, the DNS service will be required to be running on the Grid Master.
Fix: F-74639r5_fix
Navigate to Grid >> Grid Manager >> Services tab. Select each available service at the top of the panel and review the Service Status. Click on the member and disable unnecessary services.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- IDNS-7X-000180
- Vuln IDs
-
- V-68525
- Rule IDs
-
- SV-83015r2_rule
Checks: C-69059r2_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. By default ZSK private keys are stored encrypted within the Infoblox database on the Grid Master. The Grid Master will by default enable the DNS service when DNSSEC is enabled for internal processing. No clients should be permitted to utilize the Grid Master DNS service. Refer to the Infoblox STIG Overview document for additional information on HSM usage. Navigate to Data Management >> DNS >> Zones. Review each zone by selecting the zone and clicking "Edit", and selecting the "Name Servers" tab. If the Grid Master is a listed name server and not marked "Stealth", this is a finding. When complete, click "Cancel" to exit the "Properties" screen.
Fix: F-74643r1_fix
Navigate to Data Management >> DNS >> Zones. Selecting the zone and click "Edit", then select the "Name Servers" tab. Mark the Grid Master as "Stealth". If no other name servers are listed, one must be added before the configuration can be valid. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- IDNS-7X-000190
- Vuln IDs
-
- V-68527
- Rule IDs
-
- SV-83017r2_rule
Checks: C-69061r2_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. By default KSK private keys are stored on the Grid Master. The Grid Master will by default enable the DNS service when DNSSEC is enabled for internal processing. No clients are permitted to utilize the Grid Master DNS service. Navigate to Data Management >> DNS >> Zones. Review each zone by selecting the zone and clicking edit, and selecting the "Name Servers" tab. If the Grid Master is a listed name server and not marked "Stealth", this is a finding. If a HSM is utilized, no further checks are necessary. When complete, click "Cancel" to exit the "Properties" screen.
Fix: F-74645r1_fix
If the Grid Master stores the keys, review each DNS zone name server configuration to ensure the Grid Master does not appear as a name server (NS record); when configured in this manner the Grid Master is configured as a stealth name server and does not service client requests. Refer to the Infoblox STIG Overview document for additional information on HSM usage.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-000877
- Version
- IDNS-7X-000200
- Vuln IDs
-
- V-68529
- Rule IDs
-
- SV-83019r1_rule
Checks: C-69063r1_chk
Review the configuration of external authentication methods to validate multi-factor authentication is enabled. Navigate to Administration >> Administrators >> Authentication Policy. Ensure multi factor authentication is enabled by validation that the multiple authentication methods are enabled and that local database is the last entry in the list. When complete, click "Cancel" to exit the "Properties" screen. If the aggregate authentication policy does not provide two or more factors, this is a finding.
Fix: F-74647r1_fix
Navigate to Administration >> Authentication Server Groups. Configure at least one remote authentication group (OCSP, TACACS+, RADIUS, LDAP, or Active Directory). Navigate to Administration >> Administrators >> Authentication Policy. Configure the remote authentication source as primary by placing it at the top of the list. If necessary, move the Local User Database entry to the bottom of the list so it is utilized last. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- SC-20
- Severity
- M
- CCI
- CCI-001178
- Version
- IDNS-7X-000210
- Vuln IDs
-
- V-68531
- Rule IDs
-
- SV-83021r2_rule
Checks: C-69065r2_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. Navigate to Data Management >> DNS >> Grid DNS properties. Toggle Advanced Mode click on "DNSSEC" tab, verify "Enable DNSSEC" is enabled. Navigate to Data Management >> DNS >> Zones. Verify that the "Signed" column is displayed. Validate that all external authoritative zones are signed by displaying "Yes". When complete, click "Cancel" to exit the "Properties" screen. If DNSSEC is not enabled, and external authoritative zones are not signed, this is a finding.
Fix: F-74649r1_fix
Navigate to Data Management >> DNS >> Zones tab. Place a check mark in the box next to the desired external authoritative zone. Using the "DNSSEC" drop-down menu in the toolbar, select "Sign zones". Acknowledge the informational banner and the service restart banner if prompted.
- RMF Control
- SC-20
- Severity
- M
- CCI
- CCI-001179
- Version
- IDNS-7X-000220
- Vuln IDs
-
- V-68533
- Rule IDs
-
- SV-83023r3_rule
Checks: C-69067r3_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. Infoblox systems within a Grid configuration automatically publish DS records to the parent zone when the child zone is signed. If all name servers for parent and child zones are within an Infoblox Grid, this is not a finding. Review the parent zones hosted on the Infoblox server for which the child zone is NOTE on the same Infoblox Grid. Each zone must include the Delegation Signer (DS) records for the child zone. If DS records are not published in the parent zone for DNSSEC signed child zones, this is a finding.
Fix: F-74651r1_fix
Navigate to Data Management >> DNS >> Zones tab. Select the parent zone, and use the DNSSEC drop-down menu to select "Import Keyset". Add the child zone DS RRs and select "Import".
- RMF Control
- SC-20
- Severity
- M
- CCI
- CCI-001179
- Version
- IDNS-7X-000230
- Vuln IDs
-
- V-68535
- Rule IDs
-
- SV-83025r3_rule
Checks: C-69069r3_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. Navigate to Data Management >> DNS >> Grid DNS properties. Toggle "Advanced Mode" and click on the "DNSSEC" tab. Validate the “Key-Signing Key Rollover Interval” is configured to a value of no less than one year. If the “Key-Signing Key Rollover Interval” is configured to more than one year, this is a finding.
Fix: F-74653r3_fix
Navigate to Data Management >> DNS >> Grid DNS Properties. Toggle Advanced Mode and select the "DNSSEC" tab. Modify the “Key-Signing Key Rollover Interval” to a period of no less than one year. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary. Follow manual key rollover procedures and ensure changes are published to all applicable systems, including parent DNS systems.
- RMF Control
- SC-20
- Severity
- M
- CCI
- CCI-001663
- Version
- IDNS-7X-000240
- Vuln IDs
-
- V-68537
- Rule IDs
-
- SV-83027r2_rule
Checks: C-69071r2_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. Review the Infoblox DNS configuration to verify only approved communications are allowed. Usage of Access Control Lists to control clients, DNS zone transfer configuration to systems external to the Infoblox grid, and grid member configuration can be used to control communications as desired. Infoblox systems within the same Grid utilize internal database transfer and do not perform zone transfers. If all systems are within the same Infoblox Grid, this is not a finding.
Fix: F-74655r1_fix
Zone transfers can be restricted at the Grid, Member, and Zone level. Configuration is inherited and can be overridden if necessary to construct the appropriate access control. Grid level configuration: Navigate to Data Management >> DNS >> Zones tab. Click "Grid DNS Properties", and toggle Advanced Mode. Member level configuration: Navigate to Data Management >> DNS >> Members/Servers tab. Click "Edit" to review each member with the DNS service status of "Running". Zone level Configuration: Navigate to Data Management >> DNS >> Zones tab. Select the "Zone Transfers" tab. Click "Override" to set permissions for "Allow zone transfers to". Configure IPv4, IPv6 networks, addresses, TSIG keys to restrict zone transfers.
- RMF Control
- SC-20
- Severity
- M
- CCI
- CCI-001663
- Version
- IDNS-7X-000250
- Vuln IDs
-
- V-68539
- Rule IDs
-
- SV-83029r3_rule
Checks: C-69073r4_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. Authoritative Check: Navigate to Data Management >> DNS >> Zones. Ensure external authoritative zones are DNSSEC signed. Recursive Check: Navigate to Data Management >> DNS >> Zones. Note: DNSSEC validation is only applicable on a grid member where recursion is active. Edit "Grid DNS Properties", toggle Advanced Mode, and select the DNSSEC tab. Validate that both "Enable DNSSEC" and "Enable DNSSEC Validation" are enabled. When complete, click "Cancel" to exit the "Properties" screen. If DNSSEC is not utilized for authoritative DNS and recursive clients this is a finding. Note: To add "Signed" column, select an existing column, select the down arrow, select "Columns", select "Edit Columns", select the check box for "Visible" and select "Apply".
Fix: F-74657r1_fix
Authoritative Fix: Navigate to Data Management >> DNS >> Zones. Select the appropriate zone using the check box, then use the "DNSSEC" drop-down menu and select "Sign Zones". Follow prompt to acknowledge zone signing. Recursive Fix: Navigate to Data Management >> DNS >> Zones. Edit "Grid DNS Properties", toggle Advanced Mode, and select the "DNSSEC" tab. Enable both "Enable DNSSEC" and "Enable DNSSEC Validation" options. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000260
- Vuln IDs
-
- V-68543
- Rule IDs
-
- SV-83033r1_rule
Checks: C-69077r1_chk
Review the NS records for each zone hosted and confirm that each authoritative name server is located at a different physical location than the remaining name servers. Infoblox supports designation as a "stealth" name server, which will not have a NS record. If all name servers, for which NS records are listed, are not physically at different locations, this is a finding.
Fix: F-74661r1_fix
Configure the authoritative name servers to be geographically disbursed.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- IDNS-7X-000270
- Vuln IDs
-
- V-68545
- Rule IDs
-
- SV-83035r1_rule
Checks: C-69079r1_chk
Navigate to Data Management >> DNS >> Zones tab. Review each zone by clicking "Edit" and inspecting the "Name Servers" tab. If the all entries in the "Type" column are configured as "Grid", this check is not applicable. Verify that each zone which contains non-Grid name servers is further verified by inspection of the "Zone Transfers" tab and configuration of TSIG Access Control Entry (ACE). If there is a non-Grid system which utilizes zone transfers but does not have a TSIG key, this is a finding. When complete, click "Cancel" to exit the "Properties" screen.
Fix: F-74663r1_fix
Navigate to Data Management >> DNS >> Zones tab. Select a zone and click "Edit". Click on "Zone Transfers" tab, and click "Override" for the "Allow Zone Transfers to" section. Use the radio button to select "Set of ACEs" and the "Add" dropdown to configure a TSIG key. It is important to verify that both the Infoblox and other DNS server have the identical TSIG configuration. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary. Verify zone transfers are operational after configuration of TSIG.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- IDNS-7X-000280
- Vuln IDs
-
- V-68547
- Rule IDs
-
- SV-83037r3_rule
Checks: C-69081r3_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. Infoblox Systems can be configured in two ways to limit DDNS client updates. For clients that support GSS-TSIG, navigate to Data Management >> DNS >> Members/Servers tab. Review each server with the DNS service enabled. Select each server, click "Edit", toggle Advanced Mode and select GSS-TSIG. Verify that "Enable GSS-TSIG authentication of clients" is enabled. For clients that do not support GSS-TSIG, navigate to Data Management >> DNS >> Members/Servers tab. Review each server with the DNS service enabled. Select each server, click "Edit". Select the "Updates" tab. Verify that either a Named ACL or Set of ACEs are defined to limit client DDNS. When complete, click "Cancel" to exit the "Properties" screen. If clients that support GSS-TSIG do not have "Enable GSS-TSIG authentication of clients" set or a named ACL or set of ACEs for clients that do not support GSS-TSIG, this is a finding.
Fix: F-74665r2_fix
Infoblox Systems can be configured in two ways to limit DDNS client updates. For clients that support GSS-TSIG, navigate to Data Management >> DNS >> Members/Servers tab. Review each server with the DNS service enabled. Select each server, click "Edit", toggle Advanced Mode and select GSS-TSIG. Configure the option "Enable GSS-TSIG authentication of clients". Upload the required keys. Refer to the Administration Guide for detailed instructions. For clients that do not support GSS-TSIG, navigate to Data Management >> DNS >> Members/Servers tab. Review each server with the DNS service enabled. Select each server, click "Edit". Select the "Updates" tab. Select either an existing Named ACL or configure a new Set of ACEs to limit client DDNS. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- IDNS-7X-000310
- Vuln IDs
-
- V-68549
- Rule IDs
-
- SV-83039r1_rule
Checks: C-69083r1_chk
By default all system events are logged to the local SYSLOG. To ensure logging of data in the event of system failure, an external log server must be configured. Navigate to Grid >> Grid Manager >> Grid Properties >> Monitoring tab. When complete, click "Cancel" to exit the "Properties" screen. If "Log to External Syslog Servers" is enabled, an External Syslog Server must be configured and "Copy Audit Log Message to Syslog" must be configured otherwise, this is a finding.
Fix: F-74667r1_fix
Navigate to Grid >> Grid Manager >> Grid Properties >> Monitoring tab. Enable "Log to External Syslog Server", Configure at least one "External Syslog Servers". When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- IDNS-7X-000340
- Vuln IDs
-
- V-68551
- Rule IDs
-
- SV-83041r1_rule
Checks: C-69085r1_chk
Infoblox systems have a number of options that can be configured to reduce the ability to be exploited in a DoS attack. Primary consideration for this check should be given to client restrictions such as disabling open recursive servers, using ACLs to limit client communication, placement in secure network architecture to prevent address spoofing. If there is an open recursive DNS service on external name servers, or unrestricted access to internal name servers, this is a finding.
Fix: F-74669r1_fix
Navigate to Data Management >> DNS >> Grid DNS Properties. Select "Queries" tab. For external authoritative name servers disable "Allow Recursion" by clearing the check box. For internal name servers on the "Updates" tab configure either an ACL or ACE for "Allow updates from". On the "Queries" tab, configure either an ACL or ACE for "Allow queries from". When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- IDNS-7X-000350
- Vuln IDs
-
- V-68553
- Rule IDs
-
- SV-83043r1_rule
Checks: C-69087r1_chk
Infoblox systems have a number of options that can be configured to reduce the ability to be exploited in a DoS attack. Usage of rate limiting can reduce risk from cache poisoning attacks and DoS attacks. Log on to the Infoblox system and issue the commands: "show ip_rate_limit" and "show dns_rrl" Review the output from these commands with the network architecture. If rate limiting is not configured on the Infoblox system or within the network security architecture, this is a finding. Note: "set dns_rrl" is only applicable to code version 7.2 and above.
Fix: F-74671r1_fix
Log on to the Infoblox system using the CLI. Use "set ip_rate_limit [OPTIONS}" to reduce risk of cache poisoning attacks by rate limiting udp/53 traffic. Use "set dns_rrl" to enable DNS response rate limiting. This helps reduce the risk of DoS attacks by reducing the rate at which authoritative name servers respond to queries, such as a flood.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000370
- Vuln IDs
-
- V-68555
- Rule IDs
-
- SV-83045r1_rule
Checks: C-69089r1_chk
Infoblox systems are capable of providing notifications via remote SYSLOG, SNMP, and SMTP. Navigate to the "Grid" tab and select "Grid Properties", toggle Advanced Mode, and review "Monitoring", "SNMP", "SNMP Threshold", "Email", and "Notifications" tabs. When complete, click "Cancel" to exit the "Properties" screen. If no external notifications are enabled, this is a finding.
Fix: F-74673r1_fix
Navigate to "Grid" tab and edit "Grid Properties", toggle Advanced Mode, and review "Monitoring", "SNMP", "SNMP Threshold", "Email" and "Notifications" tab. Configure remote SYSLOG, Email, or SNMP notifications. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000390
- Vuln IDs
-
- V-68557
- Rule IDs
-
- SV-83047r3_rule
Checks: C-69091r4_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. Validate that DNSSEC validation is enabled by navigating to Data Management >> DNS >> Grid DNS properties, toggle Advanced Mode click on "DNSSEC" tab. Note: DNSSEC validation is only applicable on a grid member where recursion is active. When complete, click "Cancel" to exit the "Properties" screen. If both "Enable DNSSEC" and "Enable DNSSEC validation" are not enabled, this is a finding.
Fix: F-74675r1_fix
DNSSEC validation is enabled by navigating to Data Management >> DNS >> Grid DNS properties, toggle Advanced Mode click on "DNSSEC" tab. Enable both "Enable DNSSEC" and "Enable DNSSEC validation". When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000400
- Vuln IDs
-
- V-68559
- Rule IDs
-
- SV-83049r3_rule
Checks: C-69093r4_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. Validate that DNSSEC validation is enabled by navigating to Data Management >> DNS >> Grid DNS properties, toggle Advanced Mode click on "DNSSEC" tab. Note: DNSSEC validation is only applicable on a grid member where recursion is active. When complete, click "Cancel" to exit the "Properties" screen. If both "Enable DNSSEC" and "Enable DNSSEC validation" are not enabled, this is a finding.
Fix: F-74677r1_fix
DNSSEC validation is enabled by navigating to Data Management >> DNS >> Grid DNS properties, toggle Advanced Mode click on "DNSSEC" tab. Enable both "Enable DNSSEC" and "Enable DNSSEC validation". When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000410
- Vuln IDs
-
- V-68561
- Rule IDs
-
- SV-83051r2_rule
Checks: C-69095r2_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. Navigate to Data Management >> DNS >> Zones tab. Review each zone by clicking "Edit" and inspecting the "Name Servers" tab. If the all entries in the "Type" column are configured as "Grid", this check is not applicable. Verify that each zone which contains non-Grid name servers is further verified by inspection of the "Zone Transfers" tab and configuration of TSIG Access Control Entry (ACE). If there is a non-Grid system which utilizes zone transfers but does not have a TSIG key, this is a finding. When complete, click "Cancel" to exit the "Properties" screen.
Fix: F-74679r1_fix
Navigate to Data Management >> DNS >> Zones tab. Select a zone and click "Edit". Click on "Zone Transfers" tab, and click "Override" for the "Allow Zone Transfers to" section. Use the radio button to select "Set of ACEs" and the "Add" dropdown to configure a TSIG key. It is important to verify that both the Infoblox and other DNS server have the identical TSIG configuration. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary. Verify zone transfers are operational after configuration of TSIG.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-001914
- Version
- IDNS-7X-000430
- Vuln IDs
-
- V-68563
- Rule IDs
-
- SV-83053r1_rule
Checks: C-69097r1_chk
Infoblox systems allow configuration of DNS auditing based on selectable events. Navigate to Data Management >> DNS and select "Grid DNS Properties". Toggle Advanced mode, and review the "Logging" tab. When complete, click "Cancel" to exit the "Properties" screen. Validate that at a minimum the following categories are enabled; general, config, network, transfer-in, transfer-out, security. If these categories are not enabled this is a finding.
Fix: F-74681r1_fix
Navigate to Data Management >> DNS. Select "Grid DNS Properties". Toggle Advanced mode, and review the "Logging" tab. Enable the following categories using the check box; general, config, network, transfer-in, transfer-out, security. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000440
- Vuln IDs
-
- V-68565
- Rule IDs
-
- SV-83055r1_rule
Checks: C-69099r1_chk
Navigate to Data Management >> DNS >> Members/Servers tab. Select each grid member and click "Edit". Review the "Queries" tab. When complete, click "Cancel" to exit the "Properties" screen. If recursion is not disabled on an authoritative name server, this is a finding.
Fix: F-74683r1_fix
Navigate to Data Management >> DNS >> Members/Servers tab. Select each grid member and click "Edit". Select the "Queries" tab and disable recursion on all authoritative members. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- IDNS-7X-000460
- Vuln IDs
-
- V-68567
- Rule IDs
-
- SV-83057r1_rule
Checks: C-69101r1_chk
Navigate to Data Management >> DNS >> Zones tab. Review each zone by clicking "Edit" and inspecting the "Name Servers" tab. If the all entries in the "Type" column are configured as "Grid", this check is not applicable. Verify that each zone which contains non-Grid name servers is further verified by inspection of the "Zone Transfers" tab and configuration of TSIG Access Control Entry (ACE). If there is a non-Grid system which utilizes zone transfers but does not have a TSIG key, this is a finding. When complete, click "Cancel" to exit the "Properties" screen.
Fix: F-74685r1_fix
Navigate to Data Management >> DNS >> Zones tab. Select a zone and click "Edit". Click on "Zone Transfers" tab, and click "Override" for the "Allow Zone Transfers to" section. Use the radio button to select "Set of ACEs" and the "Add" dropdown to configure a TSIG key. It is important to verify that both the Infoblox and other DNS server have the identical TSIG configuration. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary. Verify zone transfers are operational after configuration of TSIG.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- IDNS-7X-000470
- Vuln IDs
-
- V-68569
- Rule IDs
-
- SV-83059r1_rule
Checks: C-69103r1_chk
Navigate to Data Management >> DNS >> Zones tab. Review each zone by clicking "Edit" and inspecting the "Name Servers" tab. If the all entries in the "Type" column are configured as "Grid", this check is not applicable. Verify that each zone which contains non-Grid name servers is further verified by inspection of the "Zone Transfers" tab and configuration of TSIG Access Control Entry (ACE). If there is a non-Grid system which utilizes zone transfers but does not have a TSIG key, this is a finding. When complete, click "Cancel" to exit the "Properties" screen.
Fix: F-74687r1_fix
Navigate to Data Management >> DNS >> Zones tab. Select a zone and click "Edit". Click on "Zone Transfers" tab, and click "Override" for the "Allow Zone Transfers to" section. Use the radio button to select "Set of ACEs" and the "Add" dropdown to configure a TSIG key. It is important to verify that both the Infoblox and other DNS server have the identical TSIG configuration. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary. Verify zone transfers are operational after configuration of TSIG.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000490
- Vuln IDs
-
- V-68571
- Rule IDs
-
- SV-83061r3_rule
Checks: C-69107r4_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. Validate that DNSSEC validation is enabled by navigating to Data Management >> DNS >> Grid DNS properties. Note: DNSSEC validation is only applicable on a grid member where recursion is active. Toggle Advanced Mode click on "DNSSEC" tab. When complete, click "Cancel" to exit the "Properties" screen. If both "Enable DNSSEC" and "Enable DNSSEC validation" are not enabled, this is a finding.
Fix: F-74689r1_fix
DNSSEC validation is enabled by navigating to Data Management >> DNS >> Grid DNS properties. Toggle Advanced Mode click on "DNSSEC" tab. Enable both "Enable DNSSEC" and "Enable DNSSEC validation". When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000500
- Vuln IDs
-
- V-68573
- Rule IDs
-
- SV-83063r3_rule
Checks: C-69109r5_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. Validate that DNSSEC validation is enabled by navigating to Data Management >> DNS >> Grid DNS properties. Note: DNSSEC validation is only applicable on a grid member where recursion is active. Toggle Advanced Mode click on "DNSSEC" tab. When complete, click "Cancel" to exit the "Properties" screen. If both "Enable DNSSEC" and "Enable DNSSEC validation" are not enabled, this is a finding.
Fix: F-74691r1_fix
DNSSEC validation is enabled by navigating to Data Management >> DNS >> Grid DNS properties. Toggle Advanced Mode click on "DNSSEC" tab. Enable both "Enable DNSSEC" and "Enable DNSSEC validation". When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- SC-20
- Severity
- M
- CCI
- CCI-002462
- Version
- IDNS-7X-000510
- Vuln IDs
-
- V-68575
- Rule IDs
-
- SV-83065r3_rule
Checks: C-69111r4_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. Validate that DNSSEC validation is enabled by navigating to Data Management >> DNS >> Grid DNS properties. Note: DNSSEC validation is only applicable on a grid member where recursion is active. Toggle Advanced Mode click on "DNSSEC" tab. When complete, click "Cancel" to exit the "Properties" screen. If both "Enable DNSSEC" and "Enable DNSSEC validation" are not enabled, this is a finding.
Fix: F-74693r1_fix
DNSSEC validation is enabled by navigating to Data Management >> DNS >> Grid DNS properties. Toggle Advanced Mode click on "DNSSEC" tab. Enable both "Enable DNSSEC" and "Enable DNSSEC validation". When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- SC-21
- Severity
- M
- CCI
- CCI-002465
- Version
- IDNS-7X-000520
- Vuln IDs
-
- V-68577
- Rule IDs
-
- SV-83067r3_rule
Checks: C-69113r4_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. Validate that DNSSEC validation is enabled by navigating to Data Management >> DNS >> Grid DNS properties. Note: DNSSEC validation is only applicable on a grid member where recursion is active. Toggle Advanced Mode click on "DNSSEC" tab. When complete, click "Cancel" to exit the "Properties" screen. If both "Enable DNSSEC" and "Enable DNSSEC validation" are not enabled, this is a finding.
Fix: F-74695r1_fix
DNSSEC validation is enabled by navigating to Data Management >> DNS >> Grid DNS properties. Toggle Advanced Mode click on "DNSSEC" tab. Enable both "Enable DNSSEC" and "Enable DNSSEC validation". When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- SC-21
- Severity
- M
- CCI
- CCI-002466
- Version
- IDNS-7X-000530
- Vuln IDs
-
- V-68579
- Rule IDs
-
- SV-83069r3_rule
Checks: C-69115r6_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. Validate that DNSSEC validation is enabled by navigating to Data Management >> DNS >> Grid DNS properties. Note: DNSSEC validation is only applicable on a grid member where recursion is active. Toggle Advanced Mode click on "DNSSEC" tab. If both "Enable DNSSEC" and "Enable DNSSEC validation" are not enabled this is a finding. When complete, click "Cancel" to exit the "Properties" screen. If DNSSEC validation is not enabled, this is a finding.
Fix: F-74697r1_fix
DNSSEC validation is enabled by navigating to Data Management >> DNS >> Grid DNS properties. Toggle Advanced Mode click on "DNSSEC" tab. Enable both "Enable DNSSEC" and "Enable DNSSEC validation". When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- SC-21
- Severity
- M
- CCI
- CCI-002467
- Version
- IDNS-7X-000540
- Vuln IDs
-
- V-68581
- Rule IDs
-
- SV-83071r3_rule
Checks: C-69117r4_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. Validate that DNSSEC validation is enabled by navigating to Data Management >> DNS >> Grid DNS properties. Note: DNSSEC validation is only applicable on a grid member where recursion is active. Toggle Advanced Mode click on "DNSSEC" tab. When complete, click "Cancel" to exit the "Properties" screen. If both "Enable DNSSEC" and "Enable DNSSEC validation" are not enabled, this is a finding.
Fix: F-74699r1_fix
DNSSEC validation is enabled by navigating to Data Management >> DNS >> Grid DNS properties. Toggle Advanced Mode click on "DNSSEC" tab. Enable both "Enable DNSSEC" and "Enable DNSSEC validation". When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- SC-21
- Severity
- M
- CCI
- CCI-002468
- Version
- IDNS-7X-000550
- Vuln IDs
-
- V-68583
- Rule IDs
-
- SV-83073r3_rule
Checks: C-69119r5_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. Validate that DNSSEC validation is enabled by navigating to Data Management >> DNS >> Grid DNS properties. Note: DNSSEC validation is only applicable on a grid member where recursion is active. Toggle Advanced Mode click on "DNSSEC" tab. When complete, click "Cancel" to exit the "Properties" screen. If both "Enable DNSSEC" and "Enable DNSSEC validation" are not enabled, this is a finding.
Fix: F-74701r1_fix
DNSSEC validation is enabled by navigating to Data Management >> DNS >> Grid DNS properties. Toggle Advanced Mode click on "DNSSEC" tab. Enable both "Enable DNSSEC" and "Enable DNSSEC validation". When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- IDNS-7X-000590
- Vuln IDs
-
- V-68585
- Rule IDs
-
- SV-83075r2_rule
Checks: C-69121r2_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. Verify that DNSSEC is enabled by navigating to Data Management >> DNS >> Grid DNS properties tab. Toggle Advanced Mode and review the "DNSSEC" tab to verify DNSSEC is enabled. When complete, click "Cancel" to exit the "Properties" screen. If DNSSEC validation is not enabled, this is a finding.
Fix: F-74703r1_fix
Enable that DNSSEC is by navigating to Data Management >> DNS >> Grid DNS properties tab. Toggle Advanced Mode and select the "DNSSEC" tab. Enable DNSSEC by selecting the check box. When complete, click "Save & Exit" to save changes and exit the "Properties" screen.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002421
- Version
- IDNS-7X-000600
- Vuln IDs
-
- V-68587
- Rule IDs
-
- SV-83077r2_rule
Checks: C-69123r2_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. Verify that DNSSEC is enabled by navigating to Data Management >> DNS >> Grid DNS Properties tab. Toggle Advanced Mode and review the "DNSSEC" tab to verify DNSSEC is enabled. When complete, click "Cancel" to exit the "Properties" screen. If DNSSEC is not enabled, this is a finding.
Fix: F-74705r1_fix
Enable DNSSEC is by navigating to Data Management >> DNS >> Grid DNS properties tab. Toggle Advanced Mode and select the "DNSSEC" tab. Enable DNSSEC by selecting the check box. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002420
- Version
- IDNS-7X-000610
- Vuln IDs
-
- V-68589
- Rule IDs
-
- SV-83079r1_rule
Checks: C-69125r1_chk
Navigate to Data Management >> DNS >> Zones tab. Review each zone by clicking "Edit" and inspecting the "Name Servers" tab. If the all entries in the "Type" column are configured as "Grid", this check is not applicable. Verify that each zone which contains non-Grid name servers is further verified by inspection of the "Zone Transfers" tab and configuration of TSIG Access Control Entry (ACE). If there is a non-Grid system which utilizes zone transfers but does not have a TSIG key, this is a finding. When complete, click "Cancel" to exit the "Properties" screen.
Fix: F-74707r1_fix
Navigate to Data Management >> DNS >> Zones tab. Select a zone and click "Edit". Click on "Zone Transfers" tab, and click "Override" for the "Allow Zone Transfers to" section. Use the radio button to select "Set of ACEs" and the "Add" dropdown to configure a TSIG key. It is important to verify that both the Infoblox and other DNS server have the identical TSIG configuration. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary. Verify zone transfers are operational after configuration of TSIG.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002422
- Version
- IDNS-7X-000620
- Vuln IDs
-
- V-68591
- Rule IDs
-
- SV-83081r1_rule
Checks: C-69127r1_chk
Navigate to Data Management >> DNS >> Zones tab. Review each zone by clicking "Edit" and inspecting the "Name Servers" tab. If the all entries in the "Type" column are configured as "Grid", this check is not applicable. Verify that each zone which contains non-Grid name servers is further verified by inspection of the "Zone Transfers" tab and configuration of TSIG Access Control Entry (ACE). If there is a non-Grid system which utilizes zone transfers but does not have a TSIG key, this is a finding. When complete, click "Cancel" to exit the "Properties" screen.
Fix: F-74709r1_fix
Navigate to Data Management >> DNS >> Zones tab. Select a zone and click "Edit". Click on "Zone Transfers" tab, and click "Override" for the "Allow Zone Transfers to" section. Use the radio button to select "Set of ACEs" and the "Add" dropdown to configure a TSIG key. It is important to verify that both the Infoblox and other DNS server have the identical TSIG configuration. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary. Verify zone transfers are operational after configuration of TSIG.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000640
- Vuln IDs
-
- V-68593
- Rule IDs
-
- SV-83083r1_rule
Checks: C-69129r1_chk
Within an Infoblox Grid, configuration control is done through the Grid Master. In the event of a Grid Member failure, upon replacement, the Grid Master will configure the new system to replace the failed member. A Grid Master Candidate can be configured to alleviate issues in the event of a Grid Master failure. The Grid Master will replicate the entire database to the Grid Master Candidate, which can be promoted to the Grid Master role if needed. Review Grid, Grid Manger configuration to ensure a Grid Master Candidate is configured. If the site does not have a Grid Master Candidate, or local backup and policy guidance on system recovery, this is a finding.
Fix: F-74711r1_fix
Refer to the Infoblox NIOS Administration Guide, Chapters "Deploying a Grid", and "Configuring DNS Zones", section "Assigning Zone Authority to Name Servers" if necessary.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-002702
- Version
- IDNS-7X-000660
- Vuln IDs
-
- V-68595
- Rule IDs
-
- SV-83085r1_rule
Checks: C-69131r1_chk
Infoblox systems are capable of providing notifications via remote SYSLOG, SNMP, and SMTP. Navigate to the "Grid" tab and select "Grid Properties". Toggle Advanced mode, and review "Monitoring", "SNMP", "SNMP Threshold", "Email", and "Notifications" tabs. When complete, click "Cancel" to exit the "Properties" screen. If no external notifications are enabled, this is a finding.
Fix: F-74713r1_fix
Navigate to "Grid" tab and edit "Grid Properties". Toggle Advanced mode, and review "Monitoring", "SNMP", "SNMP Threshold", "Email" and "Notifications" tab. Configure remote SYSLOG, Email, or SNMP notifications. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- IDNS-7X-000690
- Vuln IDs
-
- V-68597
- Rule IDs
-
- SV-83087r2_rule
Checks: C-69133r2_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. Navigate to Data Management >> DNS >> Grid DNS properties. Toggle Advanced Mode click on "DNSSEC" tab. Validate that all Key Signing Keys (KSK) and Zone Signing Keys (ZSK) utilize FIPS approved algorithms. When complete, click "Cancel" to exit the "Properties" screen. If non FIPS-approved algorithms are in use, this is a finding.
Fix: F-74715r1_fix
Navigate to Data Management >> DNS >> Grid DNS properties. Toggle Advanced Mode click on "DNSSEC" tab. Follow manual key rollover procedures and update all non-compliant Key Signing Keys (KSK) and Zone Signing Keys (ZSK) to utilize FIPS-approved algorithms.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000710
- Vuln IDs
-
- V-68599
- Rule IDs
-
- SV-83089r3_rule
Checks: C-69135r3_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. Review the Infoblox DNSSEC configuration and validate the ZSK rollover interval is configured for a range of no less than two months. Navigate to Data Management >> DNS >> Grid DNS properties. Toggle Advanced Mode and click on the "DNSSEC" tab. Validate the “Zone-Signing Key Rollover Interval” is configured to a value of no less than two months. If the “Zone-Signing Key Rollover Interval” is configured to a value more than two months, this is a finding. When complete, click "Cancel" to exit the "Properties" screen.
Fix: F-74717r3_fix
Navigate to Data Management >> DNS >> Grid DNS Properties. Toggle “Advanced Mode” and select the "DNSSEC" tab. Modify the “Zone-Signing Key Rollover Interval” to a period of no less than two months. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary. Follow manual key rollover procedures and ensure changes are published to all applicable systems, including parent DNS systems.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000720
- Vuln IDs
-
- V-68601
- Rule IDs
-
- SV-83091r2_rule
Checks: C-69137r2_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. Review the zone configuration and confirm that, if DNSSEC is enabled NSEC3 is utilized. Review zone data or use Global Search string ".". Type Equals NSEC Record to verify no undesired NSEC records exists. If NSEC records exist in an active zone, this is a finding.
Fix: F-74719r1_fix
Navigate to Data Management >> DNS >> Grid DNS Properties. Toggle Advanced Mode and edit the "DNSSEC" tab. Ensure "Resource Record Type for Nonexistent Proof" is set to NSEC3. Re-sign all DNSSEC zones which previously used NSEC.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000730
- Vuln IDs
-
- V-68603
- Rule IDs
-
- SV-83093r1_rule
Checks: C-69139r1_chk
For Infoblox Grid Members, log on to the Grid Master. Navigate to Data Management >> DNS >> Members/Servers tab. Verify that all assigned members have a status of "Running". For non-Infoblox systems, review DNS zone data and confirm that all systems external to the Infoblox grid have NS records which point to an active name server authoritative for the domain. If the Infoblox Grid Members do not have a status of "Running" or non-Infoblox systems do not have NS records pointing to an active name server authoritative for the domain, this is a finding.
Fix: F-74721r1_fix
Use either global search or review of DNS zone data to verify NS configuration. Remove or update any incorrect NS records or name server configuration.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000750
- Vuln IDs
-
- V-68605
- Rule IDs
-
- SV-83095r1_rule
Checks: C-69141r1_chk
Review the DNS configuration to determine all of the NS records for each zone. Based upon the NS records for each zone, determine location of each of the name servers. Verify all authoritative name servers are located on different network segments. If all authoritative name servers are not located on different network segments, this is a finding.
Fix: F-74723r1_fix
Navigate to Data Management >> DNS >> Zones. Review zone settings by selecting each zone and reviewing the "Name Servers" tab to ensure all name servers are located on different network segments.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000770
- Vuln IDs
-
- V-68607
- Rule IDs
-
- SV-83097r2_rule
Checks: C-69143r2_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. Validate that DNSSEC is enabled by navigating to Data Management >> DNS >> Grid DNS properties. Toggle Advanced Mode click on "DNSSEC" tab. When complete, click "Cancel" to exit the "Properties" screen. If "Enable DNSSEC" is not configured this is a finding.
Fix: F-74725r1_fix
DNSSEC must be enabled prior to zone signing. Enable by navigating to Data Management >> DNS >> Grid DNS properties. Toggle Advanced Mode click on "DNSSEC" tab. Enable the "Enable DNSSEC" option. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- IDNS-7X-000780
- Vuln IDs
-
- V-68609
- Rule IDs
-
- SV-83099r2_rule
Checks: C-69145r2_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. Infoblox supports FIPS compliant DSA and RSA; SHA-1, SHA-256, and SHA-512 algorithms. Navigate to Data Management >> DNS >> Grid DNS properties. Toggle Advanced Mode click on "DNSSEC" tab. Validate that all Key Signing Keys (KSK) and Zone Signing Keys (ZSK) utilize FIPS approved algorithms. When complete, click "Cancel" to exit the "Properties" screen. If FIPS approved algorithms are not used for the Key Signing Keys (KSK) and Zone Signing Keys (ZSK), this is a finding.
Fix: F-74727r1_fix
Navigate to Data Management >> DNS >> Grid DNS properties. Toggle Advanced Mode click on "DNSSEC" tab. Follow manual key rollover procedures and update all non-compliant Key Signing Keys (KSK) and Zone Signing Keys (ZSK) to utilize FIPS-approved algorithms.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000790
- Vuln IDs
-
- V-68611
- Rule IDs
-
- SV-83101r1_rule
Checks: C-69147r1_chk
There are two primary configuration options for this requirement. 1. DNS Views allow a single zone to have two different data sets, with the response based on a client match list. If DNS Views are used and the client match list is validated, this is not a finding. 2. Review the Resource Records (RRs) of each zone which is split between external and internal networks. For those internal hosts which are intended to be accessed by both internal and external users, a different RR should be listed on each of the internal and external name servers, with IP addresses reflective of the external or internal network. Traffic destined for those internal hosts will resolve to the IP address in the external name server and then should be NATd through the perimeter firewall. If a different Resource Record (RR) is not listed on each of the internal and external name servers, this is a finding.
Fix: F-74729r1_fix
Navigate to Data Management >> DNS >> Zones and review each zone. Remove any RRs listed in the internal name server configuration (or DNS view) which resolve for external hosts and remove any RRs listed in the external name server configuration which resolve to internal hosts. For hosts intended to be accessed by both internal and external clients, configure unique IP addresses in each of the internal and external name servers, respective to their location. The perimeter firewall, or other routing device, should handle the Network Address Translation to the true IP address of the destination.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000800
- Vuln IDs
-
- V-68613
- Rule IDs
-
- SV-83103r2_rule
Checks: C-69149r3_chk
Validation of this configuration item requires review of the network architecture and security configuration in addition to DNS server configuration to validate external name servers are not accessible from the internal network when a split DNS configuration is implemented. Navigate to Data Management >> DNS >> Members/Servers tab. Review both the network configuration, and access control of each Infoblox member which has the DNS service running. Select each grid member and click "Edit". Review the "Queries" tab to ensure both queries and recursion options are enabled and allowed only from the respective client networks. If a split DNS configuration is not utilized, this is not a finding. If there is no access control configured or access control does not restrict queries and recursion to the respective client network, this is a finding.
Fix: F-74731r2_fix
Navigate to Data Management >> DNS >> Members/Servers tab. Select each grid member and click "Edit". Enable and configure either an Access Control List (ACL) or Set of Access Control Entries (ACE). When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000810
- Vuln IDs
-
- V-68615
- Rule IDs
-
- SV-83105r2_rule
Checks: C-69151r3_chk
Validation of this configuration item requires review of the network architecture and security configuration in addition to DNS server configuration to validate internal name servers are not accessible from the external network when a split DNS configuration is implemented. Navigate to Data Management >> DNS >> Members/Servers tab. Review both the network configuration, and access control of each Infoblox member which has the DNS service running. Select each grid member and click "Edit". Review the "Queries" tab to ensure both queries and recursion options are enabled and allowed only from the respective client networks. If a split DNS configuration is not utilized, this is not a finding. If there is no access control configured or access control does not restrict queries and recursion to the respective client network, this is a finding.
Fix: F-74733r2_fix
Navigate to Data Management >> DNS >> Members/Servers tab. Select each grid member and click "Edit". Enable and configure either an Access Control List (ACL) or Set of Access Control Entries (ACE). When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000830
- Vuln IDs
-
- V-68617
- Rule IDs
-
- SV-83107r1_rule
Checks: C-69153r1_chk
Infoblox utilizes a robust permission structure that provides for granular configuration of user access to the administrative interface. Review the Infoblox Overview document for more information on access control and inheritance. If an access policy limiting propagation of access rights is not configured, this is a finding.
Fix: F-74735r1_fix
Navigate to Administration >> Administrators, and reconfigure "Admins", "Groups", "Roles", "Permissions", and "Authentication Policy" to the desired permissions.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-001010
- Vuln IDs
-
- V-68619
- Rule IDs
-
- SV-83109r2_rule
Checks: C-69155r2_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. Navigate to Grid >> Grid Manager >> Members tab. Review the Grid Master network configuration and verify placement on an OOB network. Review services enabled on the Grid Master and verify that no client services are enabled. The only acceptable service allowed is DNS when the Grid utilizes DNSSEC signed zones. The Grid Master must have DNS enabled to sign DNSSEC zones. If DNSSEC is enabled, verify that the Grid Master marked as "Stealth" for any zone. If an Infoblox Grid Member does not utilize the MGMT port for configuration through an OOB connection, this is a finding.
Fix: F-74737r1_fix
Navigate to Grid >> Grid Manager >> Members tab. Edit each member and configure the MGMT port on the Network tab and enable VPN over MGMT on the Advanced portion of the Network tab. Grid Masters and Grid Master candidates utilize the LAN1 port for communication and should not allow any direct client access.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- IDNS-7X-001000
- Vuln IDs
-
- V-68621
- Rule IDs
-
- SV-83111r1_rule
Checks: C-69157r1_chk
Navigate to Grid >> Grid Manager >> Services tab. Select "DHCP" and verify only internal Infoblox members have the service enabled. If an external authoritative name server has DHCP enabled this is a finding.
Fix: F-74739r1_fix
Navigate to Data Management >> DHCP >> Members/Servers tab. Select the Infoblox member using the check box and click "Stop" in the toolbar to disable the "DHCP" service.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- IDNS-7X-000990
- Vuln IDs
-
- V-68623
- Rule IDs
-
- SV-83113r1_rule
Checks: C-69159r1_chk
Navigate to Administration >> Administrators >> Authentication Policy. If the only authentication type under "Authenticate users in this order" is "Local User Database", perform the following additional validation: Navigate to Grid >> Grid Manager >> Grid Properties >> Password tab. Verify the settings are configured in accordance with current DoD Policy. If the Infoblox system is configured to utilize a remote authentication system (Active Directory, RADIUS, TACACS+, or LDAP) which enforces policy, or the password settings meet current guidance this is not a finding.
Fix: F-74741r1_fix
Navigate to Grid >> Grid Manager >> Grid Properties >> Password tab. Configure the system with appropriate values for password length, complexity, and expiration requirements.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000980
- Vuln IDs
-
- V-68625
- Rule IDs
-
- SV-83115r1_rule
Checks: C-69161r1_chk
Navigate to Grid >> Grid Manager >> Members tab. In the toolbar click the drop-down menu for "Backup", "Schedule Backup". Verify configuration of a remote backup option (TFTP, FTP, or SCP). Review the existence of backup files on the remote system. If a remote backup system is not configured, or a local backup procedure is not documented, this is a finding. If no remote or local backup is configured, but the Grid contains a Grid Master candidate, the severity of the finding is reduced.
Fix: F-74743r1_fix
Navigate to Grid >> Grid Manager >> Members tab. In the toolbar click the drop-down menu for "Backup", "Schedule Backup". Configure remote backup to TFTP, FTP, or SCP. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary. Review the existence of backup files on the remote system.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- IDNS-7X-000970
- Vuln IDs
-
- V-68627
- Rule IDs
-
- SV-83117r1_rule
Checks: C-69163r1_chk
Navigation to the HTTPS interface on the Grid Master using a web browser will display the current DoD banner. The banner text of the document MUST read: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." If the correct banner is not displayed, this is a finding.
Fix: F-74745r1_fix
Navigate to Grid >> Grid Manager >> Grid Properties. Select "Security", "advanced" tab. Click "Enable Notice and Consent Banner". Use the text box to enter the appropriate banner. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- IDNS-7X-000960
- Vuln IDs
-
- V-68629
- Rule IDs
-
- SV-83119r1_rule
Checks: C-69165r1_chk
Log on to the Infoblox Grid Master. The appropriate security classification color and text must be displayed on the top of each configuration screen. The output will also contain the text "Dynamic Page - Highest Possible Classification Is" and a colored bar with the classification. Additional text may appear if configured by the administrator. If the security classification color and text are not displayed at the top of each configuration screen, this is a finding.
Fix: F-74747r1_fix
Navigate to Grid >> Grid Manager >> Grid Properties. Select "Security", advanced tab. Click "Enable Security Banner". Use the drop-down menus to select the security level to be displayed and background color appropriate for each level. Additional text can be entered if required by DoD or local policy. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000950
- Vuln IDs
-
- V-68631
- Rule IDs
-
- SV-83121r1_rule
Checks: C-69167r1_chk
Infoblox systems are secure by design and utilize a number of access controls to prevent unauthorized usage. Infoblox systems are purpose built and do not provide privileged "root" level access, nor are they distributed as general purpose operating systems. By default all services including DNS are disabled on Infoblox systems. Services are enabled only as a result of administrator action. If any unnecessary services are running on Infoblox systems, this is a finding.
Fix: F-74749r1_fix
Review network architecture and system configuration to ensure a defense in depth architecture which utilizes secure out of band management is utilized. Review system configuration to ensure all administrators are properly authorized for the functions allowed through system rights. Validate that both SRG and STIG DNS guidance is properly applied. Navigate to Grid >> Grid Manager >> Services tab. Click on each service which is running and review the "Service Status" of each member. Click on the member and select "Stop" to disable the unnecessary service.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000940
- Vuln IDs
-
- V-68633
- Rule IDs
-
- SV-83123r2_rule
Checks: C-69169r2_chk
Infoblox DNS records the creation date of every resource record, including CNAME records in the system and the TimeStamp is attached to the CNAME object. Infoblox can also record the date when the last time this record was used or queried. CNAME records can be removed by the admin when they reach their 6 month maturity date. Navigate to Grid Manager >> Administration >> Logs >> Audit Log >> Filter >> Object Type=CNAME Record, + Action=CREATED, + TimeStamp=Before=6months Ago If there are zone-spanning CNAME records older than 6 months and the CNAME records resolve to anything other than fully qualified domain names for glue records supporting zone delegations, CNAME records supporting a system migration, or CNAME records that point to third-party Content Delivery Networks (CDN) or cloud computing platforms with an AO-approved and documented mission need, this is a finding.
Fix: F-74751r1_fix
Navigate to Grid Manager >> Administration >> Logs >> Audit Log >> Filter >> Object Type=CNAME Record, + Action=CREATED, + TimeStamp=Before=6months Ago Remove any zone-spanning CNAME records that have been active for more than six months.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000920
- Vuln IDs
-
- V-68635
- Rule IDs
-
- SV-83125r2_rule
Checks: C-69171r2_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. By default KSK and ZSK private keys are stored on the Grid Master within the Infoblox database. No clients should be permitted to utilize the Grid Master DNS service. Navigate to Data Management >> DNS >> Zones Review each zone by selecting the zone and clicking "Edit", and selecting the "Name Servers" tab. If the Grid Master is a listed name server and not marked "Stealth", this is a finding. If a Hardware Security Module (HSM) is configured, KSK and ZSK private keys are encrypted and stored on the HSM, this is not a finding.
Fix: F-74753r1_fix
For each zone that is not in compliance reconfigure the "Name Servers" tab and modify the Grid Master by selecting "Stealth". When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000900
- Vuln IDs
-
- V-68637
- Rule IDs
-
- SV-83127r1_rule
Checks: C-69177r1_chk
By default Infoblox systems utilize a random port for both DNS queries and notify messages. Verify the default configuration is not overridden. Navigate to Data Management >> DNS >> Members/Servers tab. Review each server with the DNS service enabled. Select each server, click "Edit", toggle Advanced Mode and select General >> Advanced tab. Verify that the options under "Source Port Settings"; "Set static source UDP port for queries (not recommended)" and "Set static source UDP port for notify messages" use the default value of not enabled. If configuration of either of these values exists, this is a finding. When complete, click "Cancel" to exit the "Properties" screen.
Fix: F-74759r1_fix
Navigate to Data Management >> DNS >> Grid DNS Properties. Toggle Advanced Mode and select General >> Advanced tab. Disable "Set static source UDP port for queries (not recommended)" and "Set static source UDP port for notify messages". Navigate to Data Management >> DNS >> Members/Servers tab. Review each Infoblox member with the DNS service enabled. Select each server, click "Edit", toggle Advanced Mode and select General >> Advanced tab. Locate the section labeled "Source port settings" and click "Override" to utilize the Grid default values that disable static source ports. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000890
- Vuln IDs
-
- V-68639
- Rule IDs
-
- SV-83129r1_rule
Checks: C-69179r1_chk
By default all services other than those required for management are disabled. Review the Infoblox Grid for extra services turned on and turn them off. Configuration of Out of Band (OOB) management can be enabled to separate DNS from management traffic if desired. Navigate to Grid >> Grid Manager >> Services tab. Click on each service which is running and review the Service Status of each member. If an external authoritative server is running any service other than DNS, this is a finding.
Fix: F-74761r1_fix
Navigate to Grid >> Grid Manager >> Services tab. Click on each service which is running and review the Service Status of each member. Click on the member and select "Stop" to disable the unnecessary service.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000880
- Vuln IDs
-
- V-68641
- Rule IDs
-
- SV-83131r1_rule
Checks: C-69181r1_chk
The Infoblox Grid Master should not be configured to service DNS requests from clients. Navigate to Data Management >> DNS >> Zones. Review each zone by selecting the zone and clicking "Edit", and selecting the "Name Servers" tab. If the Grid Master is a listed name server and not marked "Stealth", this is a finding.
Fix: F-74763r1_fix
For each zone that is not in compliance reconfigure the "Name Servers" tab and modify the Grid Master by selecting "Stealth". When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000860
- Vuln IDs
-
- V-68643
- Rule IDs
-
- SV-83133r1_rule
Checks: C-69183r1_chk
Infoblox systems utilize a modified version of BIND DNS software which adds features as well as addresses security issues outside of those provided by ISC. Infoblox systems are provided as a hardened appliance, and do not allow user access or upgrading of software components including BIND. The Infoblox support portal is the authoritative source to validate version and applicability of vulnerabilities. Verify the NIOS version by review of "Grid, Upgrade" tab to show all members are at the current version. Utilize the Infoblox support knowledgebase to obtain current version information. If Infoblox NIOS is not at the current approved version level, this is a finding.
Fix: F-74765r1_fix
Log on to the support site and download the current version of NIOS and perform a Grid upgrade. Refer to the Infoblox NIOS Administration Guide if necessary.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000850
- Vuln IDs
-
- V-68645
- Rule IDs
-
- SV-83135r1_rule
Checks: C-69185r1_chk
Review the entries within the root hints file and validate that the entries are correct. "G" and "H" root servers are required on the NIPRNet, as a minimum. All default settings on servers must be verified and corrected if necessary. If valid root name servers are not configured, this is a finding. Navigate Data Management >> DNS >> Grid DNS Properties. Toggle Advanced mode and review "Root Name Servers" tab to ensure it is configured correctly. Note: Validate against the current available DNS root list at the time of check.
Fix: F-74767r1_fix
Navigate Data Management >> DNS >> Grid DNS Properties. Toggle Advanced mode and select the "Root Name Servers" tab. Use the radio button to select "Use custom root name servers" and configure the desired root name servers. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- IDNS-7X-000840
- Vuln IDs
-
- V-68647
- Rule IDs
-
- SV-83137r1_rule
Checks: C-69187r1_chk
Review the Infoblox Grid configuration to verify that the appropriate zones are served by the correct internal or external member. Review the usage of DNS views as necessary. Navigate to Data Management >> DNS >> Members/Servers and Zones tabs. Review each zone and member assignment to ensure it is configured correctly with respect to its network assignment. If an external server contains internal data, or vice versa, this is a finding.
Fix: F-74769r1_fix
Navigate to Data Management >> DNS >> Members/Servers and Zones tabs. Modify the zone name server assignment as necessary to ensure role separation. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-000778
- Version
- IDNS-7X-000140
- Vuln IDs
-
- V-68699
- Rule IDs
-
- SV-83189r1_rule
Checks: C-69205r1_chk
Navigate to Data Management >> DNS >> Zones tab. Review each zone by clicking Edit and inspecting the "Name Servers" tab. If the all entries in the "Type" column are configured as "Grid", this check is not applicable. Verify that each zone which contains non-Grid name servers is further verified by inspection of the "Zone Transfers" tab and configuration of TSIG Access Control Entry (ACE). If there is a non-Grid system which utilizes zone transfers but does not have a TSIG key, this is a finding. When complete, click "Cancel" to exit the "Properties" screen.
Fix: F-74821r1_fix
Navigate to Data Management >> DNS >> Zones tab. Select a zone and click "Edit". Click on "Zone Transfers" tab, and click "Override" for the "Allow Zone Transfers to" section. Use the radio button to select "Set of ACEs" and the "Add" dropdown to configure a TSIG key. It is important to verify that both the Infoblox and other DNS server have the identical TSIG configuration. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary. Verify zone transfers are operational after configuration of TSIG.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- IDNS-7X-000290
- Vuln IDs
-
- V-68701
- Rule IDs
-
- SV-83191r3_rule
Checks: C-69207r4_chk
Note: For Infoblox DNS systems on a Classified network, this requirement is Not Applicable. Validate that DNSSEC validation is enabled by navigating to Data Management >> DNS >> Grid DNS properties, toggle Advanced Mode click on "DNSSEC" tab. When complete, click "Cancel" to exit the "Properties" screen. Note: DNSSEC validation is only applicable on a grid member where recursion is active. If both "Enable DNSSEC" and "Enable DNSSEC validation" are not enabled, this is a finding.
Fix: F-74823r1_fix
DNSSEC validation is enabled by navigating to Data Management >> DNS >> Grid DNS properties, toggle Advanced Mode click on "DNSSEC" tab. Enable both "Enable DNSSEC" and "Enable DNSSEC validation". When complete, click "Save & Close" to save the changes and exit the "Properties" screen. Perform a service restart if necessary.