STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Infoblox 8.x DNS Security Technical Implementation Guide

V-233866

CAT II (Medium)

An External authoritative DNS service member must be configured to enable DNSSEC resource records.

Rule ID

SV-233866r1082623_rule

STIG

Infoblox 8.x DNS Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000366

Discussion

The specification for a digital signature mechanism in the context of the DNS infrastructure is in the Internet Engineering Task Force's (IETF's) DNSSEC standard. In DNSSEC, trust in the public key (for signature verification) of the source is established not by going to a third party or a chain of third parties (as in public key infrastructure [PKI] chaining), but by starting from a trusted zone (such as the root zone) and establishing the chain of trust down to the current source of response through successive verifications of signature of the public key of a child by its parent. The public key of the trusted zone is called the trust anchor. After authenticating the source, the next process DNSSEC calls for is to authenticate the response. DNSSEC mechanisms involve two main processes: sign and serve, and verify signature. Before a DNSSEC-signed zone can be deployed, a name server must be configured to enable DNSSEC processing. DNSSEC is intended for third-party authenticity determination. Attempting to utilize DNSSEC internally was never an intended use case as it would require every consumer to have a third-party validating resolver installed along with a mechanism for periodic trust anchor distribution/update.

Check Content

Note: For Infoblox DNS systems on a classified network, this requirement is Not Applicable. 

1. Navigate to Data Management >> DNS >> Grid DNS properties. 
2. Toggle Advanced Mode and click on the "DNSSEC" tab.
3. Validate that DNSSEC is enabled using the check box.
4. When complete, click "Cancel" to exit the "Properties" screen. 

If "Enable DNSSEC" is not configured, this is a finding.

Fix Text

DNSSEC must be enabled prior to zone signing.  

1. Enable by navigating to Data Management >> DNS >> Grid DNS properties. 
2. Toggle Advanced Mode and click on the "DNSSEC" tab. 
3. Enable the "Enable DNSSEC" option.  
4. When complete, click "Save & Close" to save the changes and exit the "Properties" screen. 
5. Perform a service restart if necessary.