{"id":22667,"date":"2022-07-25T07:00:00","date_gmt":"2022-07-25T07:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=22667"},"modified":"2023-04-10T13:33:33","modified_gmt":"2023-04-10T13:33:33","slug":"how-to-secure-dns","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/","title":{"rendered":"How to Secure DNS"},"content":{"rendered":"\n<p>The domain name system (DNS) is basically a directory of addresses for the internet. Your browser uses DNS to find the IP for a specific service. For example, when you enter esecurityplanet.com, the browser queries a DNS service to reach the matching servers, but it\u2019s also used when you send an email.<\/p>\n\n\n\n<p>It is handy for users, as they don\u2019t have to remember the IP address for each service, but it does not come without security risks and vulnerabilities. Attackers will likely enumerate DNS to try common attacks.<\/p>\n\n\n\n<p>It\u2019s often the first step to perform further actions such as data thefts, defacing, or even <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransomware<\/a> attacks that have caused severe damages to many organizations in recent years. Besides, such attacks are loved by hackers, as it\u2019s usually hard to detect by security tools, and it allows targeting thousands of victims in one operation.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-prevent-dns-attacks\/\">How to Prevent DNS Attacks<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">DNS: Five Critical Concepts<\/h2>\n\n\n\n<p>In order to understand DNS attacks and how they can affect you, you must first understand what DNS is and how it works:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Each device connected has a unique IP to allow other machines to find and recognize them.<\/li>\n\n\n\n<li>DNS removes the hassle of memorizing barely human-readable addresses for each device and service.<\/li>\n\n\n\n<li>Every time you browse a web page, multiple DNS servers are called before you can actually see the content.<\/li>\n\n\n\n<li>The operation that consists of translating domain names into IP addresses is called DNS lookup and is handled by DNS resolvers.<\/li>\n\n\n\n<li>DNS cache, also known as DNS resolver cache, is a database filled with recent DNS lookups. Because there are multiple caches at different levels, oftentimes you have to wait for the DNS propagation when creating or updating DNS entries.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Common DNS Attacks Explained<\/h2>\n\n\n\n<p>It\u2019s not an exhaustive list, but the following techniques are the most common attacks used by threat actors to compromise DNS.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DNS spoofing or poisoning<\/h3>\n\n\n\n<p>The term <a href=\"https:\/\/www.esecurityplanet.com\/threats\/email-spoofing\/\">spoofing<\/a> means the attacker tries to impersonate a legitimate service, for example, by faking the IP associated with a domain.<\/p>\n\n\n\n<p>While DNS spoofing is a pretty popular approach, it\u2019s a generic term that covers various situations. DNS cache poisoning is probably more accurate to describe the most common scenario: In this situation, the attacker manages to fill the DNS cache with false information, so the DNS query will redirect users to a rogue IP.<\/p>\n\n\n\n<p>It\u2019s technically not possible for DNS resolvers to check the data in the cache. That\u2019s why the false information remains in the cache until the expiration, also known as TTL or time to live. Even if this attack is only temporary by definition, it\u2019s often enough to inject <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a> successfully.<\/p>\n\n\n\n<p>Most of the time, the hackers redirect users to a copy of the legitimate website to steal credentials or banking data. While there is some evidence of counterfeit websites users can spot, it\u2019s sometimes pretty hard to detect, for example, when it\u2019s an exact clone of the original app.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/dns-spoofing-attack-millions-of-devices-at-risk\/\">New DNS Spoofing Threat Puts Millions of Devices at Risk<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DNS tunneling<\/h3>\n\n\n\n<p>This attack relies on a client-server architecture and consists of using other protocols such as TCP or SSH to tunnel malware through DNS requests. The attacker will typically register a domain name and point it to his server that hosts malware.<\/p>\n\n\n\n<p>Hackers have been using this technique for a long time, as it is particularly efficient to connect a command-and-control server to an infected machine. There is no <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\">firewall<\/a> that can block these DNS requests.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DNS hijacking<\/h3>\n\n\n\n<p>In this case, the attacker redirects all queries to another domain name server, for example, after gaining unauthorized access to modify DNS records. Unlike with DNS poisoning attacks, the DNS cache is not involved.<\/p>\n\n\n\n<p>There are different approaches and techniques for DNS hijacking. For example, the hacker can modify the local DNS settings or compromise the router.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DNS amplification<\/h3>\n\n\n\n<p>The idea is to amplify the traffic of vulnerable DNS servers to hide the exact origin of an attack. The attacker forges the destination to be the victim\u2019s addresses, which can take down an entire infrastructure with minimum resources.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DNS flooding<\/h3>\n\n\n\n<p>Flooding attacks take advantage of devices that work with a high bandwidth to bomb DNS servers. The targeted servers cannot handle the gigantic volume of queries. Such attacks are often associated with super-charged botnets (e.g. <a href=\"https:\/\/www.esecurityplanet.com\/threats\/cloudflare-mirai-botnet-ddos-attack\/\">Mirai<\/a>), which can take down even the largest organizations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">DNS Encryption: DoH vs. DoT<\/h2>\n\n\n\n<p>To combat DNS attacks, major companies such as Google have pushed forward DNS <a href=\"https:\/\/www.esecurityplanet.com\/trends\/encryption-guide\/\">encryption<\/a> over TLS (DoT) or HTTPS (DoH). This is because most DNS requests have been unencrypted for years, which means DNS is prone to MITM (man-in-the-middle attacks). For example, anyone who manages to get into a <a href=\"https:\/\/www.esecurityplanet.com\/products\/wifi-security-testing-tools\/\">Wi-Fi<\/a> or a corporate network can mess with DNS queries and responses.<\/p>\n\n\n\n<p>Using free software such as <a href=\"https:\/\/www.esecurityplanet.com\/products\/wireshark\/\">Wireshark<\/a>, it\u2019s relatively easy to capture data, including sensitive operations and all internet traffic.<\/p>\n\n\n\n<p>The big problem is the blind trust between devices and DNS resolvers. Fortunately, encryption can harden access to DNS messages. While it\u2019s not the exact same concept, it\u2019s a bit like migrating from HTTP to HTTPS for a website.<\/p>\n\n\n\n<p>DNS encryption over TLS has been introduced to embed messages in secure channels. TLS handshake messages are exchanged between the client and the server before sending the encrypted DNS messages.<\/p>\n\n\n\n<p>It relies on a new port (e.g. port 53)&nbsp; that can be blocked by some firewalls and conflicts with existing architectures, which could ultimately force users to go back to unencrypted DNS requests. That\u2019s why DoH has been created to fix the problem and allow web applications to use existing APIs.<\/p>\n\n\n\n<p>DoH allows executing DNS queries through the HTTPS protocol. Without proper authorization, it\u2019s theoretically impossible to gain access to queries and responses.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Protecting DNS with DNSCrypt<\/h2>\n\n\n\n<p>DNSCrypt is a protocol that encrypts, authenticates, and optionally anonymizes communications between a DNS client and a DNS resolver.<\/p>\n\n\n\n<p>In other words, <a href=\"https:\/\/dnscrypt.info\/\" target=\"_blank\" rel=\"noreferrer noopener\">DNSCrypt<\/a> encrypts all DNS traffic. The cryptography involved is called <a href=\"https:\/\/csrc.nist.gov\/Projects\/elliptic-curve-cryptography\" target=\"_blank\" rel=\"noreferrer noopener\">elliptic-curve cryptography<\/a>.<\/p>\n\n\n\n<p>It allows filtering the traffic that passes through UDP and TCP, for example, in the browser, which is an effective security measure in corporate networks. It can prevent DNS spoofing with authentication.<\/p>\n\n\n\n<p>DNSCrypt can be installed as a client on most operating systems such as Windows, macOS, and Linux as well as Android, iOS, and open router firmwares. The most popular client is <a href=\"https:\/\/github.com\/DNSCrypt\/dnscrypt-proxy\/wiki\" target=\"_blank\" rel=\"noreferrer noopener\">dnscrypt-proxy<\/a>.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Pros<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Allows reviewing the generated traffic from the network<\/li>\n\n\n\n<li>Can block ads, malware, and spam<\/li>\n\n\n\n<li>Uses port 443<\/li>\n\n\n\n<li>Can reduce latency (e.g. in IPv4-only networks)<\/li>\n\n\n\n<li>Can be deployed on cloud servers<\/li>\n<\/ul>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li>Cons<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Security prevails over availability, which is usually a good thing but can be a drawback<\/li>\n\n\n\n<li>Can become a single point of failure if other layers are unsecured<\/li>\n<\/ul>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/secure-dns-with-dnscrypt\/\">How to Secure DNS with DNSCrypt &amp; DNSSEC<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Secure DNS With DNSSEC<\/h2>\n\n\n\n<p>The DNS Security Extension (DNSSEC) uses digital signatures based on public keys to strengthen DNS. Instead of encrypting DNS queries and responses, it secures DNS data with public and private key pairs.<\/p>\n\n\n\n<p>The private key is used to sign DNS data in a specific zone and generate a digital signature. And the public key is published in the zone. Any resolver that looks up data in the zone can retrieve the public key to validate the authenticity of the DNS data before returning to the user.<\/p>\n\n\n\n<p>If the signature is incorrect or missing, the resolver will consider it as an attack and cancel the data transfer.<\/p>\n\n\n\n<p>Moreover, DNSSEC will typically add new DNS records such as RRSIG (cryptographic signature) and DNSKEY.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li>Pros<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Effective to mitigate DNS poisoning<\/li>\n\n\n\n<li>Easy to deploy and activate<\/li>\n\n\n\n<li>Great industry support<\/li>\n<\/ul>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\">\n<li>Cons<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Uses validation instead of encryption<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Going Further: DNS Pentesting<\/h2>\n\n\n\n<p>Regular DNS pentests (penetration tests) are probably one of the best security measures you can take to secure DNS for your organization, as it will emulate real-world attacks.<\/p>\n\n\n\n<p>Pentesters will likely start by enumerating services with <a href=\"https:\/\/www.esecurityplanet.com\/networks\/nmap-vulnerability-scanning-made-easy\/\">Nmap<\/a>, and then, they might use dig to explore your DNS. For example, you can perform an authoritative search for mozilla.org with the following on <a href=\"https:\/\/www.esecurityplanet.com\/networks\/kali-linux-tutorial\/\">Kali Linux<\/a>:<\/p>\n\n\n\n<p><em>dig authority mozilla.org<\/em><\/p>\n\n\n\n<p>The ultimate goal of dig commands is to retrieve information such as the list of authoritative DNS servers, mail servers, or name servers. In addition, there are specific modules in <a href=\"https:\/\/www.esecurityplanet.com\/networks\/metasploit-framework-tutorial\/\">Metasploit<\/a> to enumerate DNS like <em>auxiliary\/gather\/enum_dns<\/em>.<\/p>\n\n\n\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-penetration-testing\/\">Best Penetration Testing Tools<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6d7baebb5a-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d7baebb5a\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d7baebb5a\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d7baebb5a\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d7baebb5a\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d7baebb5a\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d7baebb5a\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The domain name system (DNS) is basically a directory of addresses for the internet. Your browser uses DNS to find the IP for a specific service. For example, when you enter esecurityplanet.com, the browser queries a DNS service to reach the matching servers, but it\u2019s also used when you send an email. It is handy [&hellip;]<\/p>\n","protected":false},"author":267,"featured_media":19139,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[2369,3790,2645,3414,5277],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[340,377],"class_list":["post-22667","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","tag-cloud-security","tag-cybersecurity","tag-dns","tag-network-security","tag-web-security","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-dns","b2b_product-gateway-and-network-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Secure DNS | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"DNS security remains a major issue, as hijacking and spoofing attacks continue. Here&#039;s how to secure DNS and DNS servers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Secure DNS | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"DNS security remains a major issue, as hijacking and spoofing attacks continue. Here&#039;s how to secure DNS and DNS servers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-25T07:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-10T13:33:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Networking-08-1088x725-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1088\" \/>\n\t<meta property=\"og:image:height\" content=\"725\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Julien Maury\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julien Maury\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/\"},\"author\":{\"name\":\"Julien Maury\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\"},\"headline\":\"How to Secure DNS\",\"datePublished\":\"2022-07-25T07:00:00+00:00\",\"dateModified\":\"2023-04-10T13:33:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/\"},\"wordCount\":1412,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Networking-08-1088x725-1.jpg\",\"keywords\":[\"cloud security\",\"cybersecurity\",\"DNS\",\"network security\",\"Web security\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/\",\"name\":\"How to Secure DNS | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Networking-08-1088x725-1.jpg\",\"datePublished\":\"2022-07-25T07:00:00+00:00\",\"dateModified\":\"2023-04-10T13:33:33+00:00\",\"description\":\"DNS security remains a major issue, as hijacking and spoofing attacks continue. Here's how to secure DNS and DNS servers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Networking-08-1088x725-1.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Networking-08-1088x725-1.jpg\",\"width\":1088,\"height\":725,\"caption\":\"network security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Secure DNS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\",\"name\":\"Julien Maury\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"caption\":\"Julien Maury\"},\"description\":\"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jmaury\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Secure DNS | eSecurity Planet","description":"DNS security remains a major issue, as hijacking and spoofing attacks continue. Here's how to secure DNS and DNS servers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/","og_locale":"en_US","og_type":"article","og_title":"How to Secure DNS | eSecurity Planet","og_description":"DNS security remains a major issue, as hijacking and spoofing attacks continue. Here's how to secure DNS and DNS servers.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/","og_site_name":"eSecurity Planet","article_published_time":"2022-07-25T07:00:00+00:00","article_modified_time":"2023-04-10T13:33:33+00:00","og_image":[{"width":1088,"height":725,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Networking-08-1088x725-1.jpg","type":"image\/jpeg"}],"author":"Julien Maury","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Julien Maury","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/"},"author":{"name":"Julien Maury","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a"},"headline":"How to Secure DNS","datePublished":"2022-07-25T07:00:00+00:00","dateModified":"2023-04-10T13:33:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/"},"wordCount":1412,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Networking-08-1088x725-1.jpg","keywords":["cloud security","cybersecurity","DNS","network security","Web security"],"articleSection":["Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/","url":"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/","name":"How to Secure DNS | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Networking-08-1088x725-1.jpg","datePublished":"2022-07-25T07:00:00+00:00","dateModified":"2023-04-10T13:33:33+00:00","description":"DNS security remains a major issue, as hijacking and spoofing attacks continue. Here's how to secure DNS and DNS servers.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Networking-08-1088x725-1.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Networking-08-1088x725-1.jpg","width":1088,"height":725,"caption":"network security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"How to Secure DNS"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a","name":"Julien Maury","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","caption":"Julien Maury"},"description":"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.","url":"https:\/\/www.esecurityplanet.com\/author\/jmaury\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22667"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/267"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=22667"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22667\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/19139"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=22667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=22667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=22667"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=22667"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=22667"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=22667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}