UCF STIG Viewer Logo

The DNS server must implement NIST FIPS-validated cryptography for provisioning digital signatures, generating cryptographic hashes, and protecting unclassified information requiring confidentiality.


Overview

Finding ID Version Rule ID IA Controls Severity
V-68597 IDNS-7X-000690 SV-83087r1_rule High
Description
Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The application must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance they have been tested and validated.
STIG Date
Infoblox 7.x DNS Security Technical Implementation Guide 2017-04-05

Details

Check Text ( C-69133r1_chk )
Navigate to Data Management >> DNS >> Grid DNS properties.

Toggle Advanced Mode click on "DNSSEC" tab.
Validate that all Key Signing Keys (KSK) and Zone Signing Keys (ZSK) utilize FIPS approved algorithms.
When complete, click "Cancel" to exit the "Properties" screen.

If non FIPS-approved algorithms are in use, this is a finding.
Fix Text (F-74715r1_fix)
Navigate to Data Management >> DNS >> Grid DNS properties.

Toggle Advanced Mode click on "DNSSEC" tab.
Follow manual key rollover procedures and update all non-compliant Key Signing Keys (KSK) and Zone Signing Keys (ZSK) to utilize FIPS-approved algorithms.