SV-233907r621666_rule
V-233907
SRG-APP-000213-DNS-000024
IDNS-8X-700002
CAT II
10
Note: Ensure DNSSEC is configured to meet all other STIG requirements prior to signing a zone to avoid signing with an unapproved configuration.
1. Navigate to Data Management >> DNS >> Zones tab.
2. Place a check mark in the box next to the desired external authoritative zone. Using the "DNSSEC" drop-down menu in the toolbar, select "Sign zones".
3. Acknowledge the informational banner and the service restart banner if prompted.
Note: For Infoblox DNS systems on a classified network, this requirement is Not Applicable.
1. Navigate to Data Management >> DNS >> Grid DNS properties.
2. Toggle Advanced Mode, click on "DNSSEC" tab, and verify that "Enable DNSSEC" is enabled.
3. Navigate to Data Management >> DNS >> Zones. Verify that the "Signed" column is displayed.
4. Validate that all external authoritative zones are signed by displaying "Yes".
5. When complete, click "Cancel" to exit the "Properties" screen.
If DNSSEC is not enabled and external authoritative zones are not signed, this is a finding.
V-233907
False
IDNS-8X-700002
Note: For Infoblox DNS systems on a classified network, this requirement is Not Applicable.
1. Navigate to Data Management >> DNS >> Grid DNS properties.
2. Toggle Advanced Mode, click on "DNSSEC" tab, and verify that "Enable DNSSEC" is enabled.
3. Navigate to Data Management >> DNS >> Zones. Verify that the "Signed" column is displayed.
4. Validate that all external authoritative zones are signed by displaying "Yes".
5. When complete, click "Cancel" to exit the "Properties" screen.
If DNSSEC is not enabled and external authoritative zones are not signed, this is a finding.
M
5251