{"id":11463,"date":"2025-04-14T14:02:34","date_gmt":"2025-04-14T21:02:34","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=11463"},"modified":"2025-04-14T14:02:34","modified_gmt":"2025-04-14T21:02:34","slug":"what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\/","title":{"rendered":"What Is NIST SP 800-81? A Complete FAQ on The Latest Draft of NIST Secure DNS Deployment Guide"},"content":{"rendered":"<p><strong>NIST Special Publication 800-81<\/strong> is a comprehensive framework from the U.S. government that outlines best practices for secure Domain Name System (DNS). In this FAQ, we break down what NIST 800-81 is, what additions are in the latest draft updates and why they matter, and how organizations can apply its guidance to strengthen their cyber defenses.<\/p>\n<h3>Q: What is the purpose of 800-81r3?<\/h3>\n<p>A: The document is the latest draft of NIST SP 800-81, and provides updated guidelines for utilizing DNS as a foundational layer of network security and deploying DNS securely to mitigate misuse or misconfiguration as part of a zero-trust or defense-in-depth approach. The document acknowledges the change in DNS\u2019s role in securing networks since the previous edition published in 2013.<\/p>\n<h3>Q: Who is the intended audience for this guide?<\/h3>\n<p>A: The guide targets two main groups:<\/p>\n<ul class=\"list-spacing\">\n<li>Cybersecurity executives, decision makers, and organizational policy setters.<\/li>\n<li>Operational networking and cybersecurity teams.<\/li>\n<\/ul>\n<h3>Q: What is new in this version of the guide?<\/h3>\n<p>A: This version of 800-81 updates guidance on utilizing DNS as a foundational layer of network security and securing the DNS protocol and infrastructure to mitigate misuse or misconfiguration. New additions include leveraging DNS to protect against malware, ransomware, data exfiltration and support incident responses efforts and OT and IoT security.<\/p>\n<h3>Q: How applicable is 800-81r3 globally?<\/h3>\n<p>A: NIST is recognized globally as an authoritative standards organization. NIST publications are used widely by other regulators and standards bodies directly or indirectly. For instance, the European Union Agency for Cybersecurity (ENISA) NIS2 implementation guidance references 800-81. In other words, 800-81 is a set of best practices for essential and important organizations such as DNS service providers, TLD name registries, cloud computing service providers, data center service providers, content delivery network providers, managed service providers, and managed security service providers. Global cybersecurity agencies, other organizations and companies can point to 800-81 as a recognized best practice rather than develop their own and use 800-81 principles within their own security strategies and policy.<\/p>\n<h3>Q. How does DNS support cyber resiliency and security strategies?<\/h3>\n<p>A: DNS is critical for network operations and can be used as a foundational layer of security. It supports defense-in-depth and zero-trust principles by enforcing security policies, preemptively blocking access to malicious domains, and providing visibility for digital forensics and incident response.<\/p>\n<h3>Q: What are the key recommendations for DNS deployments?<\/h3>\n<p>This revision of Special Publication (SP) 800-81 acknowledges these changes in the role of DNS provides modern guidance on DNS deployments with the following high-level recommendations for network and security owners:<\/p>\n<ul class=\"list-spacing\">\n<li>Employ Protective DNS wherever technically feasible to provide additional network-wide security capabilities<\/li>\n<li>Encrypt internal and external DNS traffic wherever feasible<\/li>\n<li>Deploy dedicated DNS servers to reduce attack surfaces<\/li>\n<li>Follow all technical guidance on ensuring that DNS deployments and the DNS protocol are as secure and resilient as possible<\/li>\n<\/ul>\n<h3>Q: What is Protective DNS?<\/h3>\n<p>A: Protective DNS is DNS enhanced with security capabilities to analyze DNS queries and responses and take action to mitigate threats. Protective DNS preemptively blocks access to malicious websites and prevents the delivery of malware, ransomware, phishing, and other attacks that attempt to deliver spyware and viruses.<\/p>\n<p>The goals of deploying Protective DNS include:<\/p>\n<ul class=\"list-spacing\">\n<li>Blocking or redirecting harmful traffic in real time at the point of domain name resolution, typically before malicious activity starts<\/li>\n<li>Blocking categories of traffic with DNS by categorizing domain names that do not conform to an organization\u2019s policies or matching against known bad actor lists<\/li>\n<li>Delivering visibility into real-time and historical DNS query and response data to facilitate digital forensics and incident response<\/li>\n<li>Integrating with the wider security ecosystem as part of defense in depth, such as correlating an organization\u2019s data on assets (e.g., devices, cloud workloads) and users with the IP addresses of blocked queries<\/li>\n<li>Facilitating an organization\u2019s responsibility to comply with regulatory or contractual requirements for blocking traffic to disallowed sites (e.g., copyright violations, legal restrictions)<\/li>\n<\/ul>\n<h3>Q: What is encrypted DNS?<\/h3>\n<p>A: This refers to protocols such as DNS over TLS (DoT) and DNS over HTTPS (DoH) that encrypt DNS queries between a DNS client and recursive DNS server. <\/p>\n<h3>Q: How is authentication used to protect the DNS protocol?<\/h3>\n<p>A: Public Key Infrastructure, provided by DNS itself, can be used to cryptographically sign domains and records. Recursive DNS servers can then validate DNS responses as coming from a legitimate source. This is collectively known as DNS Security Extensions (DNSSEC). <\/p>\n<h3>Q: What are DNS hygiene best practices?<\/h3>\n<p>A: Threat actors can exploit misconfiguration and lapsed domain\/DNS resolver registration to seriously compromise DNS integrity. Organizations should implement robust processes to continuously monitor and validate the integrity of their public domains and take steps to raise the visibility of attempts to impersonate domains owned by the organization. Examples of exploitation cited in 800-81 include dangling CNAMEs, lame delegation and look-alike domains.<\/p>\n<style>\n.code-format {\n\tfont-family: 'Courier New';\n}\n.image-caption {\n    font-size: 12px;\n}\n.list-spacing li{margin-bottom:20px}\nol.list-spacing > li::marker {\n    font-weight: 700;\n}\n.img-container {\ndisplay: flex;\nflex-wrap: wrap;\njustify-content: space-between;\nheight:100%;\n}\n.img-container img {\nmargin-bottom: 10px;\nheight:inherit;\n}\n.img-8{width:60%;}\n.img-4{width:40%;}\n@media (max-width: 1024px) {\n.img-8,.img-4{width:100%;}\n}\n@media (max-width: 767px) {\n.img-container {\ndisplay: block;\n}\n.img-container img {\nwidth: 100%;\n}\n}\n<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">What Is NIST SP 800-81?<\/span> A Complete FAQ on The Latest Draft of NIST Secure DNS Deployment Guide');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>NIST Special Publication 800-81 is a comprehensive framework from the U.S. government that outlines best practices for secure Domain Name System (DNS). In this FAQ, we break down what NIST 800-81 is, what additions are in the latest draft updates and why they matter, and how organizations can apply its guidance to strengthen their cyber [&hellip;]<\/p>\n","protected":false},"author":213,"featured_media":8291,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[189,360,740],"class_list":{"0":"post-11463","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-cybersecurity","9":"tag-dns-security","10":"tag-protective-dns","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What Is NIST SP 800-81? A Complete FAQ on The Latest Draft of NIST Secure DNS Deployment Guide<\/title>\n<meta name=\"description\" content=\"Explore our comprehensive FAQ on NIST SP 800-81, the U.S. government\u2019s guidance for secure domain name system (DNS). Learn what it means, why it matters for cybersecurity, and how organizations can meet its requirements\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is NIST SP 800-81? A Complete FAQ on The Latest Draft of NIST Secure DNS Deployment Guide\" \/>\n<meta property=\"og:description\" content=\"Explore our comprehensive FAQ on NIST SP 800-81, the U.S. government\u2019s guidance for secure domain name system (DNS). Learn what it means, why it matters for cybersecurity, and how organizations can meet its requirements\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-14T21:02:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-security-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jim Mozley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"What Is NIST SP 800-81? A Complete FAQ on The Latest Draft of NIST Secure DNS Deployment Guide\" \/>\n<meta name=\"twitter:description\" content=\"Explore our comprehensive FAQ on NIST SP 800-81, the U.S. government\u2019s guidance for secure domain name system (DNS). Learn what it means, why it matters for cybersecurity, and how organizations can meet its requirements\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-security-thumbnail.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jim Mozley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\\\/\"},\"author\":{\"name\":\"Jim Mozley\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/0b615219b32a2c6209c9028af8b9ea10\"},\"headline\":\"What Is NIST SP 800-81? A Complete FAQ on The Latest Draft of NIST Secure DNS Deployment Guide\",\"datePublished\":\"2025-04-14T21:02:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\\\/\"},\"wordCount\":828,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-blog-security-thumbnail.jpg\",\"keywords\":[\"Cybersecurity\",\"DNS Security\",\"Protective DNS\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\\\/\",\"name\":\"What Is NIST SP 800-81? A Complete FAQ on The Latest Draft of NIST Secure DNS Deployment Guide\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-blog-security-thumbnail.jpg\",\"datePublished\":\"2025-04-14T21:02:34+00:00\",\"description\":\"Explore our comprehensive FAQ on NIST SP 800-81, the U.S. government\u2019s guidance for secure domain name system (DNS). Learn what it means, why it matters for cybersecurity, and how organizations can meet its requirements\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-blog-security-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-blog-security-thumbnail.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What Is NIST SP 800-81? A Complete FAQ on The Latest Draft of NIST Secure DNS Deployment Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/0b615219b32a2c6209c9028af8b9ea10\",\"name\":\"Jim Mozley\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_213_1744659534-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_213_1744659534-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_213_1744659534-96x96.jpg\",\"caption\":\"Jim Mozley\"},\"description\":\"Jim Mozley has managed TLD and Protective DNS services that are part of the UK Critical National Infrastructure and TLDs for major global tech companies and brands. Jim has a long history with DNS (and DHCP &amp; IP Address Management), working with customers on implementation, migrations, education, bespoke development, integration, and DNS related threat intelligence. In his current role, Jim works on supporting customers in the intersection of security, regulatory compliance and technical standards. He truly believes that it always starts with DNS and Jim is passionate about using it as a foundational layer of network security. It might be the firewall, but it\u2019s probably DNS.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/jim-mozley\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What Is NIST SP 800-81? A Complete FAQ on The Latest Draft of NIST Secure DNS Deployment Guide","description":"Explore our comprehensive FAQ on NIST SP 800-81, the U.S. government\u2019s guidance for secure domain name system (DNS). Learn what it means, why it matters for cybersecurity, and how organizations can meet its requirements","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\/","og_locale":"en_US","og_type":"article","og_title":"What Is NIST SP 800-81? A Complete FAQ on The Latest Draft of NIST Secure DNS Deployment Guide","og_description":"Explore our comprehensive FAQ on NIST SP 800-81, the U.S. government\u2019s guidance for secure domain name system (DNS). Learn what it means, why it matters for cybersecurity, and how organizations can meet its requirements","og_url":"https:\/\/www.infoblox.com\/blog\/security\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\/","og_site_name":"Infoblox Blog","article_published_time":"2025-04-14T21:02:34+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-security-thumbnail.jpg","type":"image\/jpeg"}],"author":"Jim Mozley","twitter_card":"summary_large_image","twitter_title":"What Is NIST SP 800-81? A Complete FAQ on The Latest Draft of NIST Secure DNS Deployment Guide","twitter_description":"Explore our comprehensive FAQ on NIST SP 800-81, the U.S. government\u2019s guidance for secure domain name system (DNS). Learn what it means, why it matters for cybersecurity, and how organizations can meet its requirements","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-security-thumbnail.jpg","twitter_misc":{"Written by":"Jim Mozley","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\/"},"author":{"name":"Jim Mozley","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/0b615219b32a2c6209c9028af8b9ea10"},"headline":"What Is NIST SP 800-81? A Complete FAQ on The Latest Draft of NIST Secure DNS Deployment Guide","datePublished":"2025-04-14T21:02:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\/"},"wordCount":828,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-security-thumbnail.jpg","keywords":["Cybersecurity","DNS Security","Protective DNS"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\/","url":"https:\/\/www.infoblox.com\/blog\/security\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\/","name":"What Is NIST SP 800-81? A Complete FAQ on The Latest Draft of NIST Secure DNS Deployment Guide","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-security-thumbnail.jpg","datePublished":"2025-04-14T21:02:34+00:00","description":"Explore our comprehensive FAQ on NIST SP 800-81, the U.S. government\u2019s guidance for secure domain name system (DNS). Learn what it means, why it matters for cybersecurity, and how organizations can meet its requirements","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-security-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-blog-security-thumbnail.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"What Is NIST SP 800-81? A Complete FAQ on The Latest Draft of NIST Secure DNS Deployment Guide"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/0b615219b32a2c6209c9028af8b9ea10","name":"Jim Mozley","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_213_1744659534-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_213_1744659534-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_213_1744659534-96x96.jpg","caption":"Jim Mozley"},"description":"Jim Mozley has managed TLD and Protective DNS services that are part of the UK Critical National Infrastructure and TLDs for major global tech companies and brands. Jim has a long history with DNS (and DHCP &amp; IP Address Management), working with customers on implementation, migrations, education, bespoke development, integration, and DNS related threat intelligence. In his current role, Jim works on supporting customers in the intersection of security, regulatory compliance and technical standards. He truly believes that it always starts with DNS and Jim is passionate about using it as a foundational layer of network security. It might be the firewall, but it\u2019s probably DNS.","url":"https:\/\/www.infoblox.com\/blog\/author\/jim-mozley\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/11463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/213"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=11463"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/11463\/revisions"}],"predecessor-version":[{"id":11471,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/11463\/revisions\/11471"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/8291"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=11463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=11463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=11463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}