STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Infoblox 8.x DNS Security Technical Implementation Guide

V-233928

CAT II (Medium)

The Infoblox DNS service member implementation must log the event and notify the system administrator when anomalies in the operation of the signed zone transfers are discovered.

Rule ID

SV-233928r1082747_rule

STIG

Infoblox 8.x DNS Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-002702

Discussion

Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing the system security policy and supporting the isolation of code and data on which the protection is based. Security functionality includes but is not limited to establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters. Notifications provided by information systems include messages to local computer consoles, and/or hardware indications, such as lights. If anomalies are not acted upon, security functions may fail to secure the system. The DNS server does not have the capability of shutting down or restarting the information system. The DNS server can be configured to generate audit records when anomalies are discovered, and the OS/NDM can then trigger notification messages to the system administrator based on the presence of those audit records.

Check Content

Infoblox systems are capable of providing notifications via remote SYSLOG, SNMP, and SMTP. 

1. Navigate to Grid >> Grid Manager >> Grid Properties, or System >> System Manager >> System Properties if using a stand-alone configuration. 
2. Select the "Monitoring" tab. 
3. Verify that "Log to External Syslog Servers" is enabled and an External Syslog Server is configured. 
4. Click "Cancel" to exit the "Properties" screen.  
5. Navigate to DNS >> DNS Management and select Grid or System DNS Properties if using a stand-alone configuration.  
6. Toggle Advanced Mode and select the "Logging" tab. Validate that the "dnssec" SYSLOG category is enabled. 
7. When complete, click "Cancel" to exit the "Properties" screen.  

If DNSSEC is not configured to send external notifications to a valid external SYSLOG server, this is a finding.

Fix Text

1. Navigate to Grid >> Grid Manager >> Grid Properties, or System >> System Manager >> System Properties if using a stand-alone configuration.  
2. Select the "Monitoring" tab.  
3. Enable "Log to External Syslog Servers" using the check box. 
4. Configure an "External Syslog Server".
5. Click "Save & Close" to save the changes and exit the "Properties" screen. 
6. Navigate to DNS >> DNS Management and select Grid or System DNS Properties if using a stand-alone configuration.  
7. Toggle Advanced Mode and select the "Logging" tab.  
8. Enable the "dnssec" SYSLOG category. 
9. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. 
10. Perform a service restart if necessary.