{"id":12001,"date":"2025-07-30T08:10:00","date_gmt":"2025-07-30T15:10:00","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=12001"},"modified":"2025-07-30T08:10:00","modified_gmt":"2025-07-30T15:10:00","slug":"emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\/","title":{"rendered":"Emerging from the Shadows: How Regulators and Policymakers Are Starting to Recognize DNS as the Critical Service It Is"},"content":{"rendered":"<p>As the old IT adage goes, DNS, the Domain Name System, is a bit like oxygen. You only notice when it is not there. DNS has been fantastically successful\u2014arguably one of the great achievements of the internet. A distributed network service that scales to the size of the internet and underpins almost all modern networking. Most of the time, it just works and does so flawlessly.  <\/p>\n<p>Taken for granted by many organizations, the utility of DNS and its criticality to the internet has not gone unnoticed by threat actors. As the excellent research from <a href=\"https:\/\/www.infoblox.com\/threat-intel\/\" target=\"_blank\">Infoblox Threat Intel<\/a> highlights, threat actors have become adept at abusing DNS. Whether it\u2019s targeting DNS for DDoS to take out entire networks, hijacking well-respected brand name domains for use in cybercrime or using DNS as the postal service for exfiltrating stolen data; DNS has in many ways become a foundation for modern cybercrime.  <\/p>\n<p>For many years, policymakers and regulators let DNS slip under their radar. With the recent legislation focused on cyber resiliency, securing critical infrastructure and even protecting citizens from the epidemic of internet fraud, the role of DNS was often obscured or ignored. Despite welcome additions to the DNS standards that facilitated the securing of the DNS infrastructure, the integrity of the protocol and even the use of DNS as a cybersecurity control, these capabilities, unfortunately, were best-kept secrets. Until now. <\/p>\n<p>In the last few years, as governments have adopted DNS as a cybersecurity control point, as evidenced by the Protective DNS services operated by governments in the United Kingdom,<sup>1<\/sup> United States<sup>2<\/sup> and Australia, regulators and policymakers have gradually started to drag DNS out of the technical policy shadows.  <\/p>\n<p>In the latest update from the National Institute of Standards and Technology (NIST) to Special Publication (SP) 800-81 <em>DNS Security Best Practices<\/em>,<sup>3<\/sup> we see a welcome update that addresses the three key issues; securing the DNS infrastructure, protecting the integrity of the DNS service and using Protective DNS as a cybersecurity control. These best practices align with recommendations that we at Infoblox have based on our extensive experience of designing and deploying DNS architectures across a broad range of organizations. Fortunately, we\u2019re also seeing similar recommendations emerge in policy directives and mandates. The European Union (EU) recently updated the NIS2 Directive<sup>4<\/sup> to include many of the same recommendations as described in NIST SP 800-81. The expectation should be that as EU member states transpose the directive into national policy, the same breadth and clarity of recommendations are included in the NIS2 mandates.  <\/p>\n<p>Going forward, there is a strong case for other regulators to align with the NIST SP 800-81 recommendations. The Saudi Arabian National Cybersecurity Authority\u2019s <em>Essential Security Controls (ECC)<\/em><sup>5<\/sup> requires the use of Protective DNS. By expanding those requirements to align with the best practices, it will help organizations have a clear set of practical recommendations that span the thicket of regulatory requirements. Thus, as DNS emerges from the shadows, there is a unique opportunity to reduce the regulatory burden and drive clarity of implementation while finally addressing the risks and opportunities that surround the critical service that is DNS. <\/p>\n<h3 style=\"font-size: 18px;\">Footnotes<\/h3>\n<ol style=\"font-size: 14px;\">\n<li><a href=\"https:\/\/www.ncsc.gov.uk\/information\/pdns\" target=\"_blank\"><em>Protective Domain Name Service (PDNS)<\/em><\/a>, National Cyber Security Centre, September 17, 2024.<\/li>\n<li><a href=\"https:\/\/www.cisa.gov\/resources-tools\/services\/protective-domain-name-system-dns-resolver\" target=\"_blank\"><em>Protective Domain Name System (DNS) Resolver<\/em><\/a>, Cybersecurity and Infrastructure Security Agency (CISA).<\/li>\n<li><a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-81r3.ipd.pdf\" target=\"_blank\"><em>NIST Special Publication 800-81 Secure Domain Name System (DNS) Deployment Guide<\/em><\/a>, Rose, Scott, Liu, Cricket, Gibson, Ross, National Institute of Standards and Technology (NIST), April 2025.<\/li>\n<li><a href=\"https:\/\/www.enisa.europa.eu\/sites\/default\/files\/2025-06\/ENISA_Technical_implementation_guidance_on_cybersecurity_risk_management_measures_version_1.0.pdf\" target=\"_blank\"><em>NIS2 Directive Technical Implementation Guidance<\/em><\/a>, European Union Agency for Cybersecurity (ENISA), June 2025.<\/li>\n<li><a href=\"https:\/\/nca.gov.sa\/ar\/ecc-en.pdf\" target=\"_blank\"><em>Essential Cybersecurity Controls<\/em><\/a>, National Cybersecurity Authority, Saudi Arabia.<\/li>\n<\/ol>\n<style>\n.code-format {\n\tfont-family: 'Courier New';\n}\n.image-caption {\n    font-size: 12px;\n}\n.list-spacing li{margin-bottom:20px}\nol.list-spacing > li::marker {\n    font-weight: 700;\n}\n.entry-content ul.list-spacing ul > li {\n    list-style-type: square;\n}\n<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">Emerging from the Shadows: <\/span>How Regulators and Policymakers Are Starting to <span class=\"gradient\">Recognize DNS as the Critical Service It Is<\/span>');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the old IT adage goes, DNS, the Domain Name System, is a bit like oxygen. You only notice when it is not there. DNS has been fantastically successful\u2014arguably one of the great achievements of the internet. A distributed network service that scales to the size of the internet and underpins almost all modern networking. [&hellip;]<\/p>\n","protected":false},"author":177,"featured_media":12006,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[357,775,576,360,740,1275,1276,69],"class_list":{"0":"post-12001","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-nist","9":"tag-nis2","10":"tag-compliance","11":"tag-dns-security","12":"tag-protective-dns","13":"tag-policy","14":"tag-regulations","15":"tag-best-practices","16":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Emerging from the Shadows: How Regulators and Policymakers Are Starting to Recognize DNS as the Critical Service It Is<\/title>\n<meta name=\"description\" content=\"As the old IT adage goes, DNS, the Domain Name System, is a bit like oxygen. You only notice when it is not there.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emerging from the Shadows: How Regulators and Policymakers Are Starting to Recognize DNS as the Critical Service It Is\" \/>\n<meta property=\"og:description\" content=\"As the old IT adage goes, DNS, the Domain Name System, is a bit like oxygen. You only notice when it is not there.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-30T15:10:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-thumbnail-emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Craig Sanderson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Emerging from the Shadows: How Regulators and Policymakers Are Starting to Recognize DNS as the Critical Service It Is\" \/>\n<meta name=\"twitter:description\" content=\"As the old IT adage goes, DNS, the Domain Name System, is a bit like oxygen. You only notice when it is not there.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-thumbnail-emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Craig Sanderson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\\\/\"},\"author\":{\"name\":\"Craig Sanderson\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/01dc95aed5cb12cffacb64848b7f24ca\"},\"headline\":\"Emerging from the Shadows: How Regulators and Policymakers Are Starting to Recognize DNS as the Critical Service It Is\",\"datePublished\":\"2025-07-30T15:10:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\\\/\"},\"wordCount\":608,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-thumbnail-emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is.jpg\",\"keywords\":[\"NIST\",\"NIS2\",\"compliance\",\"DNS Security\",\"Protective DNS\",\"Policy\",\"Regulations\",\"Best practices\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\\\/\",\"name\":\"Emerging from the Shadows: How Regulators and Policymakers Are Starting to Recognize DNS as the Critical Service It Is\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-thumbnail-emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is.jpg\",\"datePublished\":\"2025-07-30T15:10:00+00:00\",\"description\":\"As the old IT adage goes, DNS, the Domain Name System, is a bit like oxygen. You only notice when it is not there.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-thumbnail-emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-thumbnail-emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is.jpg\",\"width\":612,\"height\":408,\"caption\":\"Emerging from the Shadows: How Regulators and Policymakers Are Starting to Recognize DNS as the Critical Service It Is\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Emerging from the Shadows: How Regulators and Policymakers Are Starting to Recognize DNS as the Critical Service It Is\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/01dc95aed5cb12cffacb64848b7f24ca\",\"name\":\"Craig Sanderson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_177_1571767316-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_177_1571767316-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_177_1571767316-96x96.jpg\",\"caption\":\"Craig Sanderson\"},\"description\":\"Craig Sanderson is the Principal Cyber Security Strategist at Infoblox. Craig has over 25 years of experience in the CyberSecurity industry with a broad array of roles ranging from consultancy, security architecture, business development and product management. Over the last seven years, Craig has been responsible for creating the vision, strategy and delivered the execution of the Infoblox BloxOne Threat Defense solution. He continues to be passionate about the role that DNS can play in delivering world class cyber security with a particular emphasis on how DNS can become the foundation for national and governmental Protective DNS solutions\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/craig-sanderson\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Emerging from the Shadows: How Regulators and Policymakers Are Starting to Recognize DNS as the Critical Service It Is","description":"As the old IT adage goes, DNS, the Domain Name System, is a bit like oxygen. You only notice when it is not there.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\/","og_locale":"en_US","og_type":"article","og_title":"Emerging from the Shadows: How Regulators and Policymakers Are Starting to Recognize DNS as the Critical Service It Is","og_description":"As the old IT adage goes, DNS, the Domain Name System, is a bit like oxygen. You only notice when it is not there.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\/","og_site_name":"Infoblox Blog","article_published_time":"2025-07-30T15:10:00+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-thumbnail-emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is.jpg","type":"image\/jpeg"}],"author":"Craig Sanderson","twitter_card":"summary_large_image","twitter_title":"Emerging from the Shadows: How Regulators and Policymakers Are Starting to Recognize DNS as the Critical Service It Is","twitter_description":"As the old IT adage goes, DNS, the Domain Name System, is a bit like oxygen. You only notice when it is not there.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-thumbnail-emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is.jpg","twitter_misc":{"Written by":"Craig Sanderson","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\/"},"author":{"name":"Craig Sanderson","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/01dc95aed5cb12cffacb64848b7f24ca"},"headline":"Emerging from the Shadows: How Regulators and Policymakers Are Starting to Recognize DNS as the Critical Service It Is","datePublished":"2025-07-30T15:10:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\/"},"wordCount":608,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-thumbnail-emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is.jpg","keywords":["NIST","NIS2","compliance","DNS Security","Protective DNS","Policy","Regulations","Best practices"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\/","url":"https:\/\/www.infoblox.com\/blog\/security\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\/","name":"Emerging from the Shadows: How Regulators and Policymakers Are Starting to Recognize DNS as the Critical Service It Is","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-thumbnail-emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is.jpg","datePublished":"2025-07-30T15:10:00+00:00","description":"As the old IT adage goes, DNS, the Domain Name System, is a bit like oxygen. You only notice when it is not there.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-thumbnail-emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-thumbnail-emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is.jpg","width":612,"height":408,"caption":"Emerging from the Shadows: How Regulators and Policymakers Are Starting to Recognize DNS as the Critical Service It Is"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/emerging-from-the-shadows-how-regulators-and-policymakers-are-starting-to-recognize-dns-as-the-critical-service-it-is\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Emerging from the Shadows: How Regulators and Policymakers Are Starting to Recognize DNS as the Critical Service It Is"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/01dc95aed5cb12cffacb64848b7f24ca","name":"Craig Sanderson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_177_1571767316-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_177_1571767316-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_177_1571767316-96x96.jpg","caption":"Craig Sanderson"},"description":"Craig Sanderson is the Principal Cyber Security Strategist at Infoblox. Craig has over 25 years of experience in the CyberSecurity industry with a broad array of roles ranging from consultancy, security architecture, business development and product management. Over the last seven years, Craig has been responsible for creating the vision, strategy and delivered the execution of the Infoblox BloxOne Threat Defense solution. He continues to be passionate about the role that DNS can play in delivering world class cyber security with a particular emphasis on how DNS can become the foundation for national and governmental Protective DNS solutions","url":"https:\/\/www.infoblox.com\/blog\/author\/craig-sanderson\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12001","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=12001"}],"version-history":[{"count":6,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12001\/revisions"}],"predecessor-version":[{"id":12008,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12001\/revisions\/12008"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/12006"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=12001"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=12001"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=12001"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}