STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Infoblox 8.x DNS Security Technical Implementation Guide

V-233883

CAT I (High)

Infoblox systems must enforce current DoD password restrictions.

Rule ID

SV-233883r961863_rule

STIG

Infoblox 8.x DNS Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000366

Discussion

The Infoblox systems must be configured to meet current DoD password policy when using the Infoblox Local User Database as the authentication source.

Check Content

1. Navigate to Administration >> Administrators >> Authentication Policy. 
2. If the only authentication type under "Authenticate users in this order" is "Local User Database", perform the following additional validation: 
3. Navigate to Grid >> Grid Manager >> Grid Properties, or System >> System Manager >> System Properties if using a stand-alone configuration.  
4. Select the "Password" tab. 
5. Verify the settings are configured in accordance with current DoD Policy.  

If the Infoblox system is configured to use a remote authentication system (Active Directory, RADIUS, TACACS+, or LDAP) that enforces password policy, or the password settings meet current guidance, this is not a finding.

Fix Text

1. Navigate to Grid >> Grid Manager >> Grid Properties, or System >> System Manager >> System Properties if using a stand-alone configuration.  
2. Select the "Password" tab. 
3. Configure the system with appropriate values for password length, complexity, and expiration requirements.