DNS and the Art of preventing Attacks

Credit: Electronic Frontier Foundation

According to a comprehensive research report by Market Research Future (MRFR), “Global Managed DNS Service Market information by types of Standards, by Components, by Application and Region – forecast to 2027” market size to grow US$ 190.2 million in 2025 growing at 11.3 per cent CAGR.

Industry watchers are of the view that no data traffic should be trusted and the DNS traffic should be the first line of defence. DNS traffic should be verified at all times to ensure an effective Zero Trust Architecture.

According to the National Institute of Standards and Technology (NIST), Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network- based perimeters to focus on users, assets, and resources. A zero trust architecture (ZTA) uses zero trust principles to plan industrial and enterprise infrastructure and workflows.

The increasing adoption of managed DNS service technology in various verticals such as BFSI, media & entertainment, healthcare, retail & consumer goods, government, education, e-commerce fosters market growth. Another factor propelling the managed DNS service industry is the increasing threat of cyber-attacks.

DNS can be equated with the heart of a human being. A weakened heart can result in significant risk. Similarly, for a system if DNS is compromised it is bound to cause significant damages to an enterprise.

Organisations that do not include DNS security as part of their extended enterprise security strategy are more vulnerable to privacy issues. DNS security can not only protect their remote users, but also data and application traffic to ensure safe and secure online activities

Industry watchers are of the view that no data traffic should be trusted and the DNS traffic should be the first line of defence. DNS traffic should be verified at all times to ensure an effective Zero Trust Architecture.

According to the National Institute of Standards and Technology (NIST), Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network- based perimeters to focus on users, assets, and resources. A zero trust architecture (ZTA) uses zero trust principles to plan industrial and enterprise infrastructure and workflows.

“The DNS service is one of the most popular Internet services, and at the same time, it is the one that SysAdmins, DevOps, and Network Administrator often forget to harden.

They often focus on other popular services like database systems, SSH services, or the web servers,” said Sayed Peerzade, Executive Vice President & Chief Cloud Officer, Yotta Infrastructure.

He further explained that DNS server configurations that lack proper security hardening can sometimes lead to really serious problems, as attackers can exploit the system to perform things like transferring DNS zones, modify DNS resolvers to report different IP addresses to scam people, redirect web and email traffic, or launch dangerous DNS amplifying attacks, among other types of attacks.

When this happens, website visitors don’t have a way to detect their traffic has been redirected to another server, or that their email was sent to a different server than the original MX servers from the attacked domain.

That’s why it’s so important to always keep your DNS servers secured. “To improve their overall security posture, organizations should better leverage the extensive insights provided by DNS to feed actionable threat intelligence data to the whole security ecosystem,” according to Romain Fouchereau Research Manager, IDC.

“I created the ISP ecosystem in Hathway (an Internet Service Provider from India) and I know how important DNS is for internet services. Since Cloud is the most common and critical service now, DNS services are more important,” added Peerzade.

This can be prevented by

  • Auditing DNS zones
  • Keep your DNS servers up-to-date
  • Hide BIND version
  • Restrict Zone Transfers
  • Disable DNS recursion to prevent DNS poisoning attacks
  • Use isolated DNS servers
  • Use a DDOS mitigation provider
  • Two-Factor Authentication

“Hackers will always try to target public company services, researching to find weaknesses inside your Domain Name System. Having a solid DNS hardening policy will help to mitigate most of the attacks described above.

Start auditing your DNS zones today using SecurityTrails as the first step in order to secure your DNS servers, collect information, and try to reduce your DNS public information as much as possible,” Peerzade concluded.

Publish on W.Media
Author Info - W.Media
Share This Article
Other Popular Posts