STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Infoblox 7.x DNS Security Technical Implementation Guide

V-214205

CAT II (Medium)

All authoritative name servers for a zone must be located on different network segments.

Rule ID

SV-214205r961863_rule

STIG

Infoblox 7.x DNS Security Technical Implementation Guide

Version

V2R2

CCIs

CCI-000366

Discussion

Most enterprises have an authoritative primary server and a host of authoritative secondary name servers. It is essential that these authoritative name servers for an enterprise be located on different network segments. This dispersion ensures the availability of an authoritative name server not only in situations in which a particular router or switch fails but also during events involving an attack on an entire network segment. A network administrator may choose to use a "hidden" master authoritative server and only have secondary servers visible on the network. A hidden master authoritative server is an authoritative DNS server whose IP address does not appear in the name server set for a zone. If the master authoritative name server is "hidden", a secondary authoritative name server may reside on the same network as the hidden master.

Check Content

Review the DNS configuration to determine all of the NS records for each zone. Based upon the NS records for each zone, determine location of each of the name servers.
Verify all authoritative name servers are located on different network segments.

If all authoritative name servers are not located on different network segments, this is a finding.

Fix Text

Navigate to Data Management >> DNS >> Zones.

Review zone settings by selecting each zone and reviewing the "Name Servers" tab to ensure all name servers are located on different network segments.