{"id":4738,"date":"2009-08-26T11:25:29","date_gmt":"2009-08-26T18:25:29","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4738"},"modified":"2020-05-06T10:31:47","modified_gmt":"2020-05-06T17:31:47","slug":"dns-security-getting-the-attention-it-deserves","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-getting-the-attention-it-deserves\/","title":{"rendered":"DNS Security Getting the Attention It Deserves"},"content":{"rendered":"<p>According to\u00a0<a class=\" bf_ungated_init\" href=\"http:\/\/www.it-scc.org\/documents\/itscc\/IT_Sector_Risk_Assessment_Report_Final.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">a DHS report<\/a>\u00a0cited in\u00a0<a href=\"http:\/\/blogs.ft.com\/techblog\/2009\/08\/website-directory-system-is-most-vulnerable-to-attack\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">FT&#8217;s Tech Blog<\/a>, DNS is &#8220;the part of U.S. information technology most at risk from a serious attack.&#8221; The report lists several &#8220;mitigations&#8221; of the threats against DNS, including monitoring, infrastructure diversity, anycast (called out by name!) and DNSSEC.<\/p>\n<p>The report &#8220;is intended to provide an all-hazards risk profile&#8230; to inform resource allocation for research and development and other protective program measures to enhance the security and resiliency of the critical IT Sector functions.&#8221; If you&#8217;re looking for help in your crusade to bolster your DNS infrastructure by adding geographically distributed name servers, introducing anycast, or rolling out DNSSEC, look no further! Print a copy of this 114-page monster out, highlight section 3.2, and drop it on your boss&#8217;s desk.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to\u00a0a DHS report\u00a0cited in\u00a0FT&#8217;s Tech Blog, DNS is &#8220;the part of U.S. information technology most at risk from a serious attack.&#8221; The report lists several &#8220;mitigations&#8221; of the threats against DNS, including monitoring, infrastructure diversity, anycast (called out by name!) and DNSSEC. The report &#8220;is intended to provide an all-hazards risk profile&#8230; to inform [&hellip;]<\/p>\n","protected":false},"author":178,"featured_media":2809,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[30,229,16,15],"class_list":{"0":"post-4738","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-dns","9":"tag-dnssec","10":"tag-infoblox","11":"tag-security","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DNS Security Getting the Attention It Deserves<\/title>\n<meta name=\"description\" content=\"According to a DHS report cited in FT&#039;s Tech Blog, DNS is &quot;the part of U.S. information technology most at risk from a serious attack.&quot;\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/dns-security-getting-the-attention-it-deserves\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS Security Getting the Attention It Deserves\" \/>\n<meta property=\"og:description\" content=\"According to a DHS report cited in FT&#039;s Tech Blog, DNS is &quot;the part of U.S. information technology most at risk from a serious attack.&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/dns-security-getting-the-attention-it-deserves\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2009-08-26T18:25:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:31:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Avoiding-VDI-Voodoo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cricket Liu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cricket Liu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-getting-the-attention-it-deserves\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-getting-the-attention-it-deserves\\\/\"},\"author\":{\"name\":\"Cricket Liu\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\"},\"headline\":\"DNS Security Getting the Attention It Deserves\",\"datePublished\":\"2009-08-26T18:25:29+00:00\",\"dateModified\":\"2020-05-06T17:31:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-getting-the-attention-it-deserves\\\/\"},\"wordCount\":137,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-getting-the-attention-it-deserves\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Avoiding-VDI-Voodoo.jpg\",\"keywords\":[\"DNS\",\"DNSSEC\",\"Infoblox\",\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-getting-the-attention-it-deserves\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-getting-the-attention-it-deserves\\\/\",\"name\":\"DNS Security Getting the Attention It Deserves\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-getting-the-attention-it-deserves\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-getting-the-attention-it-deserves\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Avoiding-VDI-Voodoo.jpg\",\"datePublished\":\"2009-08-26T18:25:29+00:00\",\"dateModified\":\"2020-05-06T17:31:47+00:00\",\"description\":\"According to a DHS report cited in FT's Tech Blog, DNS is \\\"the part of U.S. information technology most at risk from a serious attack.\\\"\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-getting-the-attention-it-deserves\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-getting-the-attention-it-deserves\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-getting-the-attention-it-deserves\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Avoiding-VDI-Voodoo.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Avoiding-VDI-Voodoo.jpg\",\"width\":660,\"height\":454,\"caption\":\"Avoiding VDI Voodoo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-security-getting-the-attention-it-deserves\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DNS Security Getting the Attention It Deserves\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\",\"name\":\"Cricket Liu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"caption\":\"Cricket Liu\"},\"description\":\"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/cricket-liu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DNS Security Getting the Attention It Deserves","description":"According to a DHS report cited in FT's Tech Blog, DNS is \"the part of U.S. information technology most at risk from a serious attack.\"","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-getting-the-attention-it-deserves\/","og_locale":"en_US","og_type":"article","og_title":"DNS Security Getting the Attention It Deserves","og_description":"According to a DHS report cited in FT's Tech Blog, DNS is \"the part of U.S. information technology most at risk from a serious attack.\"","og_url":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-getting-the-attention-it-deserves\/","og_site_name":"Infoblox Blog","article_published_time":"2009-08-26T18:25:29+00:00","article_modified_time":"2020-05-06T17:31:47+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Avoiding-VDI-Voodoo.jpg","type":"image\/jpeg"}],"author":"Cricket Liu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cricket Liu","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-getting-the-attention-it-deserves\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-getting-the-attention-it-deserves\/"},"author":{"name":"Cricket Liu","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5"},"headline":"DNS Security Getting the Attention It Deserves","datePublished":"2009-08-26T18:25:29+00:00","dateModified":"2020-05-06T17:31:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-getting-the-attention-it-deserves\/"},"wordCount":137,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-getting-the-attention-it-deserves\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Avoiding-VDI-Voodoo.jpg","keywords":["DNS","DNSSEC","Infoblox","Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-getting-the-attention-it-deserves\/","url":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-getting-the-attention-it-deserves\/","name":"DNS Security Getting the Attention It Deserves","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-getting-the-attention-it-deserves\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-getting-the-attention-it-deserves\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Avoiding-VDI-Voodoo.jpg","datePublished":"2009-08-26T18:25:29+00:00","dateModified":"2020-05-06T17:31:47+00:00","description":"According to a DHS report cited in FT's Tech Blog, DNS is \"the part of U.S. information technology most at risk from a serious attack.\"","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-getting-the-attention-it-deserves\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/dns-security-getting-the-attention-it-deserves\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-getting-the-attention-it-deserves\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Avoiding-VDI-Voodoo.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Avoiding-VDI-Voodoo.jpg","width":660,"height":454,"caption":"Avoiding VDI Voodoo"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-security-getting-the-attention-it-deserves\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"DNS Security Getting the Attention It Deserves"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5","name":"Cricket Liu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","caption":"Cricket Liu"},"description":"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.","url":"https:\/\/www.infoblox.com\/blog\/author\/cricket-liu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4738","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/178"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4738"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4738\/revisions"}],"predecessor-version":[{"id":4739,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4738\/revisions\/4739"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2809"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4738"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4738"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}