STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Infoblox 8.x DNS Security Technical Implementation Guide

V-233883

CAT I (High)

Infoblox systems must enforce current DoD password restrictions.

Rule ID

SV-233883r961863_rule

STIG

Infoblox 8.x DNS Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000366

Discussion

The Infoblox systems must be configured to meet current DoD password policy when using the Infoblox Local User Database as the authentication source.

Check Content

1. Navigate to Administration >> Administrators >> Authentication Policy. 
2. If the only authentication type under "Authenticate users in this order" is "Local User Database", perform the following additional validation: 
3. Navigate to Grid >> Grid Manager >> Grid Properties, or System >> System Manager >> System Properties if using a stand-alone configuration.  
4. Select the "Password" tab. 
5. Verify the settings are configured in accordance with current DoD Policy.  

If the Infoblox system is configured to use a remote authentication system (Active Directory, RADIUS, TACACS+, or LDAP) that enforces password policy, or the password settings meet current guidance, this is not a finding.

Fix Text

1. Navigate to Grid >> Grid Manager >> Grid Properties, or System >> System Manager >> System Properties if using a stand-alone configuration.  
2. Select the "Password" tab. 
3. Configure the system with appropriate values for password length, complexity, and expiration requirements.