STIGQter STIGQter: STIG Summary: Infoblox 8.x DNS Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 09 Jan 2021:

The DNS implementation must implement internal/external role separation.

DISA Rule

SV-233873r621666_rule

Vulnerability Number

V-233873

Group Title

SRG-APP-000516-DNS-000101

Rule Version

IDNS-8X-400015

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

1. Navigate to Data Management >> DNS >> Zones and Members.
2. Modify the zone name server assignment as necessary to ensure role separation.
3. When complete, click "Save & Close" to save the changes and exit the "Properties" screen.
4. Perform a service restart if necessary.

Check Contents

Review the Infoblox Grid configuration and network architecture to verify that the appropriate zones are served by the correct internal or external member(s).

1. Navigate to Data Management >> DNS >> Zones tab. Review the usage of DNS Views as necessary.
2. If DNS Views are used, review each DNS View Client Match list using the "Edit" function.
3. Select the "Members" tab.
4. Review each zone and member assignment to ensure it is configured correctly with respect to its network assignment.
5. When complete, click "Cancel" to exit the "Properties" screen.

If an external server contains internal data, or vice versa, this is a finding.

Vulnerability Number

V-233873

Documentable

False

Rule Version

IDNS-8X-400015

Severity Override Guidance

Review the Infoblox Grid configuration and network architecture to verify that the appropriate zones are served by the correct internal or external member(s).

1. Navigate to Data Management >> DNS >> Zones tab. Review the usage of DNS Views as necessary.
2. If DNS Views are used, review each DNS View Client Match list using the "Edit" function.
3. Select the "Members" tab.
4. Review each zone and member assignment to ensure it is configured correctly with respect to its network assignment.
5. When complete, click "Cancel" to exit the "Properties" screen.

If an external server contains internal data, or vice versa, this is a finding.

Check Content Reference

M

Target Key

5251

Comments