{"id":32760,"date":"2023-11-10T19:53:06","date_gmt":"2023-11-10T19:53:06","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=32760"},"modified":"2024-01-04T17:12:54","modified_gmt":"2024-01-04T17:12:54","slug":"what-is-dns-security","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/","title":{"rendered":"What Is DNS Security? Everything You Need to Know"},"content":{"rendered":"\n<p>DNS security protects the domain name system (DNS) from attackers seeking to reroute traffic to malicious sites. Since a majority of business IT traffic now accesses or passes through the internet, DNS plays an increasingly important \u2014 and vulnerable \u2014 role.<\/p>\n\n\n\n<p>This article will provide an overview of DNS Security, common attacks, and how to use DNS security to prevent DNS attacks and manipulation.<\/p>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-horizontal row\">\n    \n        <!--\n            ICP Plugin - body horizontal\n            ----------\n            Category: \n            Count: 3\n            Country: HK\n        -->\n    <\/div><!-- ICP Plugin: End -->\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_68_1 ez-toc-wrap-left counter-flat ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-66d6da72196db\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-66d6da72196db\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/#Why-DNS-Security-is-Important\" title=\"Why DNS Security is Important\">Why DNS Security is Important<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/#5-Common-DNS-Attacks\" title=\"5 Common DNS Attacks\">5 Common DNS Attacks<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/#How-DNS-Security-Works\" title=\"How DNS Security Works\">How DNS Security Works<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/#Can-You-Prevent-DNS-Attacks\" title=\"Can You Prevent DNS Attacks?\">Can You Prevent DNS Attacks?<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/#Bottom-Line-Pursue-DNS-Security-Sooner-Than-Later\" title=\"Bottom Line: Pursue DNS Security Sooner Than Later\">Bottom Line: Pursue DNS Security Sooner Than Later<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Why-DNS-Security-is-Important\"><\/span>Why DNS Security is Important<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>DNS security is important because all computers use DNS whenever they try to communicate with websites and applications hosted on the internet. DNS converts URL domain names, such as www.esecurityplanet.com, into a machine-understandable IP address, such as 146.75.93.91, that will be used by routers to actually make the connections.<\/p>\n\n\n\n<p>The DNS protocol was designed for use within a firewall on a secure network, and by default will communicate in plain text. The DNS protocol is installed on servers and typically will store the most frequently requested sites \u2014 such as Google.com, Outlook.com, etc. \u2014 in the DNS cache for more efficient delivery of information to users.<\/p>\n\n\n\n<p>A modern computing environment includes branch offices, remote workers, and mobile devices that must reach DNS servers from outside the firewall. This additional and unsecured traffic can cause traditional DNS servers to struggle to meet the security standards for any organization to prevent attacks.<\/p>\n\n\n\n<p>Hackers will attempt to compromise the DNS process by:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Intercepting plain text DNS communication for espionage<\/li>\n\n\n\n<li>Poisoning the DNS cache with false information to redirect communications to malicious websites<\/li>\n\n\n\n<li>Compromising DNS servers to redirect traffic to malicious websites<\/li>\n\n\n\n<li>Denying DNS services through <a href=\"https:\/\/www.esecurityplanet.com\/networks\/types-of-ddos-attacks\/\">distributed denial of service<\/a> (DDoS) attacks to halt communications<\/li>\n<\/ul>\n\n\n\n<p>Without a functioning DNS solution, organizations will be unable to reach web-based resources or provide internet-based services to clients. Additionally, some attackers will use DNS disruptions to conceal more dangerous cyberattacks such as data theft, ransomware preparations, or inserting backdoors into other resources. To <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-prevent-dns-attacks\/\">prevent a DNS attack<\/a>, organizations need to secure their DNS processes for both local and remote users.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"5-Common-DNS-Attacks\"><\/span>5 Common DNS Attacks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Hackers continuously probe discovered DNS systems because these systems will touch all users in a network. The most common DNS attacks include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>DNS cache poisoning<\/strong> hacks a local DNS server to replace the IP addresses for legitimate sites in the cache with malicious IP addresses to be delivered to users for future DNS queries<\/li>\n\n\n\n<li><strong>DNS domain lock-up DDoS<\/strong> attacks overwhelm legitimate DNS servers by abusing the DNS protocol with:\n<ul class=\"wp-block-list\">\n<li>Slow TCP connections = domain lock-up DDoS<\/li>\n\n\n\n<li>Overwhelming requests = flood DDoS<\/li>\n\n\n\n<li>Non-existent records = NXDOMAIN (no existence domain) DDoS<\/li>\n\n\n\n<li>Queries with spoofed IP addresses = reflection-amplification DDoS<\/li>\n\n\n\n<li>Non-existent URL subdomains = subdomain DDoS<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>DNS hijacking<\/strong> redirects queries to a malicious DNS server by replacing information in the DNS record through malware, a compromised equipment (DNS server, router, etc.), or a compromised domain registrar account<\/li>\n\n\n\n<li><strong>DNS spoofing<\/strong> impersonates a legitimate website to harvest credentials, infect visitors with <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware\/\">malware<\/a>, or other attacks; this attack often benefits from successfully conducted DNS poisoning attacks that redirect cached DNS queries to the DNS spoofed website<\/li>\n\n\n\n<li><strong>DNS tunneling<\/strong> delivers malware to users, runs <a href=\"https:\/\/www.esecurityplanet.com\/products\/bot-protection\/\">botnets<\/a> such as DNS Beaconing, or exfiltrates data through trusted but compromised DNS communication on port 53 or through encrypted DNS queries over SSH, TCP, or HTTP protocols<\/li>\n<\/ul>\n\n\n\n<p><em>For more information on DDoS protection, see our list of the <a href=\"https:\/\/www.esecurityplanet.com\/products\/distributed-denial-of-service-ddos-protection-vendors\/\">top DDoS protection vendors<\/a> and our guides to <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-stop-ddos-attacks-tips-for-fighting-ddos-attacks\/\">stopping<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-prevent-ddos-attacks\/\">preventing<\/a> DDoS attacks.<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"747\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/ESP_DNSUnderAttack_23_DA_rnd2-1-1024x747.png\" alt=\"An Illustration of Various Attacks on DNS\" class=\"wp-image-33354\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/ESP_DNSUnderAttack_23_DA_rnd2-1-1024x747.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/ESP_DNSUnderAttack_23_DA_rnd2-1-300x219.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/ESP_DNSUnderAttack_23_DA_rnd2-1-768x560.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/ESP_DNSUnderAttack_23_DA_rnd2-1-1536x1120.png 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/ESP_DNSUnderAttack_23_DA_rnd2-1-2048x1494.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Various types of DNS Attacks on Users and DNS Resources<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How-DNS-Security-Works\"><\/span>How DNS Security Works<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>DNS security protects against compromise through layers of security and filtering similar to the way <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\">next generation firewalls<\/a> (NGFW) protect communication data flows. Typical security measures include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Communication channel encryption<\/strong> using DNS over TLS (DoT) or DNS over HTTPS (DoH) authenticated and encrypted communication<\/li>\n\n\n\n<li><strong>DNS logging<\/strong> and log analysis to check for signs of compromise or malicious access and communication<\/li>\n\n\n\n<li><strong>Hide main DNS servers<\/strong> from public or low-level security access and use secondary DNS servers to handle requests from end-users instead<\/li>\n\n\n\n<li><strong>Protocol strengthening<\/strong> using the additional DNS Security Extension (DNSSEC) or DNSCrypt protocols to authenticate and encrypt DNS communication to known-good DNS resources<\/li>\n\n\n\n<li><strong>Reputation filtering<\/strong> blocks or redirects DNS requests for known-malicious domains and IP addresses directly by using <a href=\"https:\/\/www.esecurityplanet.com\/applications\/whitelisting-vs-blacklisting-which-is-better\/\">whitelisting\/blacklisting<\/a> or through recursive DNS services<\/li>\n\n\n\n<li><strong>Server load protection<\/strong> reduces the effectiveness of DDoS attacks with typical server-strengthening techniques such as dedicated servers, load balancing, redundancy, and over-sizing capacity for the servers providing DNS services<\/li>\n\n\n\n<li><strong>Traffic inspection<\/strong> for DNS no longer assumes the protocol is trusted and checks for malware and other malicious traffic within DNS inquiry traffic using NGFW or DNS firewalls<\/li>\n<\/ul>\n\n\n\n<p>Using a strong mix of these DNS security solutions can provide additional security protection for the entire organization against malware, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/phishing-attacks\/\">phishing<\/a>, and botnets. Of these options, one of the most important is DNSSEC, which should be incorporated by organizations of all sizes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What Are DNS Security Extensions (DNSSEC)?<\/h3>\n\n\n\n<p>Domain Name System Security Extension (DNSSEC) protocols authenticate DNS traffic by adding support for cryptographically signed responses. DNSSEC can be implemented without cost and will typically be the first step taken to improve DNS security. Most commercial DNS security solutions incorporate DNSSEC as a fundamental offering to all customers.<\/p>\n\n\n\n<p>DNSSEC offers features and benefits that directly address major weaknesses in the DNS protocol, but can be easily confused with other DNS solutions since they are so similarly named. To help clarify DNSSEC, we will explore both the DNSSEC features and benefits and compare it against DNS Security, DNS Crypt, and Encrypted DNS.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">DNSSEC Features &amp; Benefits<\/h4>\n\n\n\n<p>When an unprotected DNS server makes a request to resolve a URL into an IP address, it sends out a request. When the answer is received, it can be difficult to determine the authenticity of the answer. DNSSEC adds data origin authentication and data integrity protection through the publishing of public encryption keys along with the IP address and URL directory.<\/p>\n\n\n\n<p>The DNSSEC features include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Authenticated denial of existence (DoE)<\/strong> provides authoritative information to <em>DNS resolvers<\/em> \u2014 DNS servers responsible for translating domain names into IP addresses \u2014 that a domain does not exist so that requests for that domain can be resolved quickly<\/li>\n\n\n\n<li><strong>Authenticated NODATA<\/strong> provides authoritative information to DNS resolvers that a domain exists, but that the requested data, such as an IPv6 address, does not exist for that domain<\/li>\n\n\n\n<li><strong>DNS Zones<\/strong> publish public encryption keys to validate domains and addresses published by domain registrars in that zone<\/li>\n\n\n\n<li><strong>DNS resolvers validate signatures<\/strong> for DNSSEC-signed domains to verify that the addresses are authentic and accurate<\/li>\n<\/ul>\n\n\n\n<p>These features directly protect against:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>DNS cache poisoning<\/strong>, because delivered DNS results can be checked against the digital signature to check for authenticity<\/li>\n\n\n\n<li><strong>DNS NXDOMAIN and subdomain DDoS attacks<\/strong>, because authenticated DoE and NODATA results can eliminate non-existent queries more efficiently<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">DNS Security vs. DNSSEC vs. DNSCrypt vs. Encrypted DNS<\/h4>\n\n\n\n<p>While DNSSEC provides powerful protection, it does not provide comprehensive security or protection. A DNS server or service enabling DNSSEC protocols alone still sends requests in plain text and remains vulnerable to other types of DNS attacks.<\/p>\n\n\n\n<p>To understand how other DNS security components complement DNSSEC, let\u2019s compare against the terms <a href=\"https:\/\/www.dnscrypt.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">DNSCrypt<\/a>, Encrypted DNS, and DNS Security:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>DNSSEC<\/strong> provides source authentication and integrity validation for DNS inquiries<\/li>\n\n\n\n<li><strong>DNSCrypt<\/strong> uses elliptic-curve cryptography to provide open-source and free end-to-end encryption between servers and endpoints for DNS inquires<\/li>\n\n\n\n<li><strong>Encrypted DNS<\/strong> uses authenticated and encrypted protocols for DNS inquiries through DNS over TLS (DoT) or DNS over HTTPS (DoH)<\/li>\n\n\n\n<li><strong>DNS Security<\/strong> is a catch-all term that encompasses all methods used to protect DNS security from specific protocols (DNSSEC, DNSCrypt, etc.), encryption, methods used to improve DNS server security, and services purchased to protect DNS<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Can-You-Prevent-DNS-Attacks\"><\/span>Can You Prevent DNS Attacks?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>DNS Attacks can be prevented or reduced in impact. Our article on <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-prevent-dns-attacks\/\">How to Prevent DNS Attacks<\/a> goes into more detail, but at a high level, different solutions will be more effective against certain types of DNS attacks and less effective against others.<\/p>\n\n\n\n<p>For example, DNSSEC improves resistance against DNS cache poisoning, but does not address DNS tunneling or any of the DNS DDoS attacks. Similarly, a firewall that performs DNS packet inspection will directly address DNS tunneling and some DDoS attacks, but cannot protect against DNS cache poisoning.<\/p>\n\n\n\n<p>As with all cybersecurity vulnerabilities, security is best improved through layers of defenses, improved protocols, and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">network security<\/a> best practices such as <a href=\"https:\/\/www.esecurityplanet.com\/networks\/patch-management\/\">regular patching<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\">access management<\/a>, and <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-network-monitoring-tools\/\">monitoring<\/a> for attacks. Each IT environment is distinct, so the specific security that provides the best solutions for each organization may be different; however, all DNS attack prevention solutions should provide protection against DDoS attacks, DNS result verification, and DNS traffic monitoring.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3 Top DNS Security Solutions<\/h3>\n\n\n\n<p>In a practical sense, an organization can accomplish a lot by focusing effort on <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-dns\/\">how to secure DNS<\/a> on their existing DNS Server without big investments in services or tools. However, DNS plays such a critical role in our internet-dependent IT infrastructure that extra investments can dramatically reduce attack risks throughout the organization.<\/p>\n\n\n\n<p>When selecting a security solution, the main points to consider are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Protecting the DNS process<\/strong> to protect against receiving compromised DNS information<\/li>\n\n\n\n<li><strong>Protecting the DNS server<\/strong> to keep the integrity of the DNS data and mitigate against DNS DDoS attacks<\/li>\n\n\n\n<li><strong>Protecting the DNS traffic<\/strong> against DNS tunneling attacks that use the DNS traffic as cover for other activities<\/li>\n<\/ul>\n\n\n\n<p>The three top solutions directly address these issues:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Recursive DNS Lookup Services<\/strong> (Google Public DNS, Quad9, etc.) enable integrity of the DNS process by providing authoritative and authenticated DNS sources.<\/li>\n\n\n\n<li><strong>Cloud-based DNS Filtering and Security<\/strong> (Cisco Umbrella, Palo Alto DNS Security, NS1, etc.) protect the DNS process similar to lookup services, but also block known-malicious sources to help protect DNS traffic and isolate the DNS server against DDoS attacks.<\/li>\n\n\n\n<li><strong>DNS Service with Proprietary DNS Servers<\/strong> (Google Cloud DNS, Cloudflare DNS, F5 Distributed Cloud DNS, etc.) outsource the entire DNS to a provider that provides global access and broad security for the DNS process, server, and traffic.<\/li>\n<\/ul>\n\n\n\n<p>In addition to the dedicated DNS solutions above, DNS security will often be included as a feature in many other integrated security solutions such as next generation firewalls (NGFW), <a href=\"https:\/\/www.esecurityplanet.com\/products\/secure-web-gateway-vendors\/\">secure web gateways<\/a> (SWG), Secure Service Edge (SSE), and <a href=\"https:\/\/www.esecurityplanet.com\/products\/secure-access-service-edge-sase\/\">Secure Access Service Edge<\/a> (SASE). Some vendors even offer onsite tools to integrate DNS, dynamic host configuration protocol (DHCP), and IP address management (IPAM) into an integrated DDI solution for local and cloud-based servers to manage these fundamental network protocols.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Bottom-Line-Pursue-DNS-Security-Sooner-Than-Later\"><\/span>Bottom Line: Pursue DNS Security Sooner Than Later<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>With so many options that suit a wide range of capabilities and budgets, organizations should take action to secure DNS servers and communications today. Attackers already seek vulnerable DNS solutions and abuse them on a daily basis.<\/p>\n\n\n\n<p>A modest investment in time can improve basic DNS security, and more aggressive investments can dramatically reduce risk. After all, with most processes now touching the internet, a secure DNS solution can block threats beyond DNS processes and help secure email, endpoints, remote users, and more.<\/p>\n\n\n\n<p><strong>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-a-network\/\">Network Protection: How to Secure a Network<\/a><\/strong><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6da71ddda8-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6da71ddda8\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6da71ddda8\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6da71ddda8\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6da71ddda8\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6da71ddda8\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6da71ddda8\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A rise in DNS attacks have led to an increased focus on its security. Discover what it is, how it works, and how to prevent DNS attacks now.<\/p>\n","protected":false},"author":271,"featured_media":32761,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[3790,980,2645,860,3414,730,5277],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[382,402,383,395,381,31775],"class_list":["post-32760","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","tag-cybersecurity","tag-ddos","tag-dns","tag-encryption","tag-network-security","tag-security","tag-web-security","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-application-security-vulnerability-management","b2b_product-ddos","b2b_product-encryption-data-loss-prevention","b2b_product-firewalls-and-intrusion-prevention-and-detection","b2b_product-network-access-control-nac","b2b_product-web-applications-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is DNS Security? Everything You Need to Know<\/title>\n<meta name=\"description\" content=\"A rise in DNS attacks have led to an increased focus on its security. Discover what it is, how it works, and how to prevent DNS attacks now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is DNS Security? Everything You Need to Know\" \/>\n<meta property=\"og:description\" content=\"A rise in DNS attacks have led to an increased focus on its security. Discover what it is, how it works, and how to prevent DNS attacks now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-10T19:53:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-04T17:12:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/11\/esp_20231110-what-is-dns-security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chad Kime\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chad Kime\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/\"},\"author\":{\"name\":\"Chad Kime\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\"},\"headline\":\"What Is DNS Security? Everything You Need to Know\",\"datePublished\":\"2023-11-10T19:53:06+00:00\",\"dateModified\":\"2024-01-04T17:12:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/\"},\"wordCount\":1859,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/11\/esp_20231110-what-is-dns-security.png\",\"keywords\":[\"cybersecurity\",\"DDOS\",\"DNS\",\"encryption\",\"network security\",\"security\",\"Web security\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/\",\"name\":\"What Is DNS Security? Everything You Need to Know\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/11\/esp_20231110-what-is-dns-security.png\",\"datePublished\":\"2023-11-10T19:53:06+00:00\",\"dateModified\":\"2024-01-04T17:12:54+00:00\",\"description\":\"A rise in DNS attacks have led to an increased focus on its security. Discover what it is, how it works, and how to prevent DNS attacks now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/11\/esp_20231110-what-is-dns-security.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/11\/esp_20231110-what-is-dns-security.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: Anterovium\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is DNS Security? Everything You Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\",\"name\":\"Chad Kime\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"caption\":\"Chad Kime\"},\"description\":\"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is DNS Security? Everything You Need to Know","description":"A rise in DNS attacks have led to an increased focus on its security. Discover what it is, how it works, and how to prevent DNS attacks now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/","og_locale":"en_US","og_type":"article","og_title":"What Is DNS Security? Everything You Need to Know","og_description":"A rise in DNS attacks have led to an increased focus on its security. Discover what it is, how it works, and how to prevent DNS attacks now.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/","og_site_name":"eSecurity Planet","article_published_time":"2023-11-10T19:53:06+00:00","article_modified_time":"2024-01-04T17:12:54+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/11\/esp_20231110-what-is-dns-security.png","type":"image\/png"}],"author":"Chad Kime","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Chad Kime","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/"},"author":{"name":"Chad Kime","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9"},"headline":"What Is DNS Security? Everything You Need to Know","datePublished":"2023-11-10T19:53:06+00:00","dateModified":"2024-01-04T17:12:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/"},"wordCount":1859,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/11\/esp_20231110-what-is-dns-security.png","keywords":["cybersecurity","DDOS","DNS","encryption","network security","security","Web security"],"articleSection":["Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/","url":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/","name":"What Is DNS Security? Everything You Need to Know","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/11\/esp_20231110-what-is-dns-security.png","datePublished":"2023-11-10T19:53:06+00:00","dateModified":"2024-01-04T17:12:54+00:00","description":"A rise in DNS attacks have led to an increased focus on its security. Discover what it is, how it works, and how to prevent DNS attacks now.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/11\/esp_20231110-what-is-dns-security.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/11\/esp_20231110-what-is-dns-security.png","width":1400,"height":900,"caption":"Image: Anterovium\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/what-is-dns-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"What Is DNS Security? Everything You Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9","name":"Chad Kime","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","caption":"Chad Kime"},"description":"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.","url":"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/32760"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/271"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=32760"}],"version-history":[{"count":5,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/32760\/revisions"}],"predecessor-version":[{"id":33355,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/32760\/revisions\/33355"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/32761"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=32760"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=32760"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=32760"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=32760"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=32760"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=32760"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}