STIGQter STIGQter: STIG Summary: Infoblox 8.x DNS Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 09 Jan 2021:

The Infoblox system must employ strong authenticators in the establishment of non-local maintenance and diagnostic sessions.

DISA Rule

SV-233905r621666_rule

Vulnerability Number

V-233905

Group Title

SRG-APP-000185-DNS-000021

Rule Version

IDNS-8X-600001

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Note: Refer to the Infoblox Administrator Guide for details on each type of authentication server.

1. Navigate to Administration >> Authentication Server Groups.
2. Configure at least one remote authentication group (OCSP, TACACS+, RADIUS, LDAP, or Active Directory).
3. Navigate to Administration >> Administrators >> Authentication Policy.
4. Configure the remote authentication source as primary by placing it at the top of the list.
5. If necessary, move the Local User Database entry to the bottom of the list so it is used last.
6. When complete, click "Save & Close" to save the changes and exit the "Properties" screen.
7. Perform a service restart if necessary.

Check Contents

Review the configuration of external authentication methods to verify that multifactor authentication is enabled.

1. Navigate to Administration >> Administrators >> Authentication Policy.
2. Ensure multifactor authentication is enabled by validating that the multiple authentication methods are enabled and that the local database is the last entry in the list.
3. When complete, click "Cancel" to exit the "Properties" screen.

If the aggregate authentication policy does not provide two or more factors, this is a finding.

Vulnerability Number

V-233905

Documentable

False

Rule Version

IDNS-8X-600001

Severity Override Guidance

Review the configuration of external authentication methods to verify that multifactor authentication is enabled.

1. Navigate to Administration >> Administrators >> Authentication Policy.
2. Ensure multifactor authentication is enabled by validating that the multiple authentication methods are enabled and that the local database is the last entry in the list.
3. When complete, click "Cancel" to exit the "Properties" screen.

If the aggregate authentication policy does not provide two or more factors, this is a finding.

Check Content Reference

M

Target Key

5251

Comments