STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Infoblox 7.x DNS Security Technical Implementation Guide

V-214224

CAT I (High)

Infoblox systems must be configured with current DoD password restrictions.

Rule ID

SV-214224r961863_rule

STIG

Infoblox 7.x DNS Security Technical Implementation Guide

Version

V2R2

CCIs

CCI-000366

Discussion

The Infoblox systems must be configured to meet current DoD password policy when using the Infoblox Local User Database as the authentication source.

Check Content

Navigate to Administration >> Administrators >> Authentication Policy.

If the only authentication type under "Authenticate users in this order" is "Local User Database", perform the following additional validation:

Navigate to Grid >> Grid Manager >> Grid Properties >> Password tab.

Verify the settings are configured in accordance with current DoD Policy.

If the Infoblox system is configured to utilize a remote authentication system (Active Directory, RADIUS, TACACS+, or LDAP) which enforces policy, or the password settings meet current guidance this is not a finding.

Fix Text

Navigate to Grid >> Grid Manager >> Grid Properties >> Password tab.

Configure the system with appropriate values for password length, complexity, and expiration requirements.