DNS security best practices to implement now (original) (raw)

arthead - stock.adobe.com

Article 3 of 3

Part of: Intro to DNS security

DNS is a key component in any enterprise network. Auditing DNS servers and encrypting DNS traffic are just two of the steps to take to protect your organization's DNS deployment.

DNS is one of the most critical services on a network. It translates easy-to-remember domain names into difficult-to-remember IP addresses, enabling users and administrators to refer to network resources by name while permitting network nodes to address packets with destination IP addresses. Without DNS, we'd have to use IP addresses to establish and recognize all network resources.

Clearly, such a critical service must be well protected from malicious data, changed information and eavesdropping. Let's examine some DNS security best practices that protect the integrity and privacy of your name resolution services.

Basic DNS server management

The first set of DNS security best practices involve creating a hardened and redundant DNS deployment. Use the following strategies to create a secure baseline that provides a solid platform for additional settings:

Standard DNS server configurations

After hardening the DNS platform, consider the security settings within the DNS service itself. The following best practices specify DNS configurations that help mitigate threats to name resolution:

Implement DNS forwarding

Redirect DNS name resolution requests for external resources to dedicated DNS servers residing in the DMZ. Internal DNS servers resolve internal resources. When queries come through that do not match an internal resource, they are sent to specific DNS servers with direct connectivity to the internet. These name resolution servers in turn resolve IP addresses for internet sites. Not directly exposing internal DNS servers to the internet fortifies their security.

Manage DNS zone transfers

DNS zone transfers keep redundant DNS servers current. The DNS service implementation typically enables administrators to restrict zone transfers to specific IP addresses. Ensure this setting includes only legitimate DNS servers and no additional devices. DNS encryption options, among them Domain Name Security Extensions (DNSSEC), also help secure this process.

Implement Active Directory integrated zones

Windows AD and DNS administrators can integrate DNS zone transfers and DNS updates into the more extensive AD replication process. This option provides additional security for DNS information within AD replication. It also offers multi-master replication of DNS data, eliminating a separate DNS replication topology. AD's replication process also yields greater redundancy and efficiency.

Use DNS filtering to block malicious sites

DNS filters check client domain requests against a blocklist to prevent access to specified sites before name resolution attempts even occur. This effectively stops many threats before they happen -- for example, preventing users from accessing sites containing malware or content that violates the organization's acceptable use policy. Admins can maintain custom blocklists or acquire updated lists from third-party sources.

Implement DNS encryption

Encryption is key to protecting the integrity of DNS data and the confidentiality of client name resolution questions. Organizations have multiple encryption options to consider, including approaches that validate DNS data, such as DNSSEC, or protect client queries, such as DNSCrypt, DNS over TLS (DoT) or DNS over HTTPS (DoH).

Instituting DNS security best practices

It's hard to overestimate the importance of DNS. Without it, network communications would be far more difficult. Various malicious activities threaten name resolution, including unauthorized changes to data and privacy violations. Mitigate these concerns by deploying DNS on hardened servers and defining configurations that match your organization's security requirements. In addition, pay attention to the last mile in the name resolution process by encrypting data between the DNS client and the name resolution servers.

Compare this list of best practices to your DNS infrastructure today to see where to improve your organization's security stance and offer better name resolution services to your clients.

Damon Garn owns Cogspinner Coaction and provides freelance IT writing and editing services. He has written multiple CompTIA study guides, including the Linux+, Cloud Essentials+ and Server+ guides, and contributes extensively to TechTarget Editorial, The New Stack and CompTIA Blogs.

Next Steps

Types of DNS servers and how they work, plus security threats

Dig Deeper on Network security

Part of: Intro to DNS security

Article 3 of 3