{"id":7923,"date":"2022-08-17T12:24:50","date_gmt":"2022-08-17T19:24:50","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7923"},"modified":"2023-10-12T09:09:20","modified_gmt":"2023-10-12T16:09:20","slug":"the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\/","title":{"rendered":"The U.K.\u2019s NCSC Recommends Protective DNS for Government and Industry"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The UK&#8217;s prestigious National Cyber Security Centre (NCSC) has issued <\/span><a href=\"https:\/\/www.ncsc.gov.uk\/guidance\/protective-dns-for-private-sector\"><span style=\"font-weight: 400;\">important recommendations<\/span><\/a><span style=\"font-weight: 400;\"> for private companies and government agencies to use Protective DNS (PDNS) to secure and protect information technology assets and networks. PDNS provides key defense against malicious cyber threats and can greatly reduce the effectiveness of ransomware, phishing, botnet, and malware campaigns by blocking access to known malicious domains. PDNS also provides very substantial utility for organizations which can use DNS query logs as an authoritative source of data for incident response and threat hunting activities. While NCSC provides their own <\/span><a href=\"https:\/\/www.ncsc.gov.uk\/information\/pdns\"><span style=\"font-weight: 400;\">PDNS service<\/span><\/a><span style=\"font-weight: 400;\"> for government organizations and emergency services in the UK, they also recommend private companies to select a <\/span><a href=\"https:\/\/media.defense.gov\/2021\/Mar\/03\/2002593055\/-1\/-1\/0\/CSI_Selecting-Protective-DNS_UOO11765221.PDF\"><span style=\"font-weight: 400;\">PDNS provider<\/span><\/a><span style=\"font-weight: 400;\"> that has experience in cybersecurity and DNS.\u00a0\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The NCSC is the UK\u2019s technical authority for cyber threats. The NCSC was formed in 2016 to provide a unified national response to cyber threats. The NCSC monitors incidents, provides early warnings, disseminates information, conducts cyber threat assessments and provides general technical support to competent authorities. The NCSC also acts as a bridge between the UK\u2019s industry and government, providing a unified source of advice, guidance, and support on cybersecurity, including the management of cybersecurity incidents.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">NCSC\u2019s role in responding to cyber threats is substantial and often involves coordination with the cybersecurity and intelligence agencies in the United States, New Zealand, Australia, Canada, and many countries within Europe. In Europe, the NCSC remains in close coordination and information sharing with the European Union Agency for Network and Information Security (ENISA), the EU CSIRTs Network, the European Government CERTs (EGC) group, and the TF-CSIRT task force. The NCSC has strong technical expertise and can leverage the brightest and best cyber defense minds within the UK and partner organizations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">During the same time period, The National Security Agency (NSA) and the Cybersecurity &amp; Infrastructure Security Agency (CISA) released a Joint Cybersecurity Information (CSI) brief which contained similar strong guidance on the importance of selecting a protective Domain Name System (PDNS). The NCSC\u2019s most recent guidance is in complete alignment with the NSA\/CISA CSI technical recommendations, both of which stress the criticality and urgency of implementing a PDNS solution.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">NCSC Guidance\u2014Why Use Protective DNS<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Protective DNS was designed to stop the use of DNS by threat actors in support of malware distribution and operation. Protective DNS works by making your networks use a given DNS resolver, or set of resolvers. These resolvers, run by the protective DNS provider, base their responses to queries on a set of policies which determine which queries will be allowed and which will be blocked.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Typically, both the domain name being requested, and the IP address returned from a query will be checked against a Block List and access is prevented if there is a match. Additionally, some protective DNS providers will attempt to block visits to websites with programmatically generated domain names, which are used by malware to circumvent Block Lists.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Protective DNS prevents access to a range of malicious sites including domains distributing malware, command, and control domains used to control malware, and domains used in phishing attacks, including those used for fraud.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Preventing access to these domains should protect your organization against malicious actors, making it harder for them to compromise your networks, and harder to exploit any compromises.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A secondary benefit from protective DNS is the ability to analyze, and potentially be alerted to, DNS requests made to blocked domains. This information should be incorporated into a Security Information and Event Management (SIEM) model, allowing for effective investigation of incidents. Organizations should have DNS logging in place\u2014this is an important and integral part of the monitoring process.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the UK, the NCSC has arranged for a PDNS to be available for use immediately by central government, local authorities, devolved administrations, emergency services, NHS organizations, and the Ministry of Defense. The NCSC has provided private enterprise with recommendations and technical guidance to acquire the necessary PDNS functionality from vendor sources.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Selecting a PDNS Provider<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The NCSC recommends the acquisition of services from trusted providers. Per the NCSC\u2019s recommendations, trusted providers demonstrate experience and technical expertise in cybersecurity and DNS. Trusted providers should show that they can protect against threats that can, in turn, be blocked by protective DNS. Trust providers should keep their technical expertise up to date. Most importantly, trusted providers should ensure that their policies and block lists are regularly updated by effective intelligence feeds. These intelligence feeds should be regularly reviewed to ensure that they are most effective.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Agencies within other countries are issuing similar recommendations, such as the US&#8217; NSA who published the previously referenced <\/span><a href=\"https:\/\/media.defense.gov\/2021\/Mar\/03\/2002593055\/-1\/-1\/0\/CSI_Selecting-Protective-DNS_UOO11765221.PDF\"><span style=\"font-weight: 400;\">guidance on selecting a Protective DNS service<\/span><\/a><span style=\"font-weight: 400;\">, including a comparison of the capabilities of different providers.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">No Surprise \u2013 Most Malware Leverages DNS in the Attack Chain<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The recommendations for the implementation of a PDNS follow in the wake of a common thread used by many threat actors to exploit and leverage DNS. DNS is continually used to set up and execute attack chains. Sooner or later malware must reach back to command &amp; control, and DNS is used as a covert communication channel for this purpose. The attack may involve DNS queries when the victim\u2019s system is compromised and infected. DNS is almost always used when an infected system communicates with the command and control (C&amp;C) servers.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">PDNS can help reduce the risk of the successful exploitation of your DNS infrastructure. A review of MITRE ATT&amp;CK shows that threat actors leverage a multitude of techniques to directly exploit and utilize DNS.\u00a0<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"3\"><b>MITRE ATT&amp;CK TACTICS USED BY ATTACKERS TO LEVERAGE DNS<\/b><\/td>\n<\/tr>\n<tr>\n<td><b>TACTIC<\/b><\/td>\n<td><b>TECHNIQUES<\/b><\/td>\n<td><b>SUB-TECHNIQUES<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Reconnaissance<\/span><\/td>\n<td><span style=\"font-weight: 400;\">T1590 Gather Victim Network Information<\/span><\/td>\n<td><span style=\"font-weight: 400;\">.001 Domain Properties<\/span><\/p>\n<p><span style=\"font-weight: 400;\">.002 DNS<\/span><\/p>\n<p><span style=\"font-weight: 400;\">.004 Network Topology<\/span><\/p>\n<p><span style=\"font-weight: 400;\">.005 IP Addresses<\/span><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><span style=\"font-weight: 400;\">T1598 Phishing for Information<\/span><\/td>\n<td><span style=\"font-weight: 400;\">.003 Spearphishing Link<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Resource Development<\/span><\/td>\n<td><span style=\"font-weight: 400;\">T1583 Acquire Infrastructure<\/span><\/td>\n<td><span style=\"font-weight: 400;\">.001 Domains<\/span><\/p>\n<p><span style=\"font-weight: 400;\">.002 DNS Server<\/span><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><span style=\"font-weight: 400;\">T1584 State Capabilities<\/span><\/td>\n<td><span style=\"font-weight: 400;\">.002 Upload Tool<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Initial Access<\/span><\/td>\n<td><span style=\"font-weight: 400;\">T1189 Drive-by Compromise<\/span><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><span style=\"font-weight: 400;\">T1190 Exploit Public-Facing Application<\/span><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><span style=\"font-weight: 400;\">T1566 Phishing<\/span><\/td>\n<td><span style=\"font-weight: 400;\">.002 Spearphishing Link<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Execution<\/span><\/td>\n<td><span style=\"font-weight: 400;\">T1204 User Execution<\/span><\/td>\n<td><span style=\"font-weight: 400;\">.001 Malicious Link<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Credential Access<\/span><\/td>\n<td><span style=\"font-weight: 400;\">T1557 Adversary-in-the-Middle<\/span><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><span style=\"font-weight: 400;\">T1040 Network Sniffing<\/span><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Command &amp; Control<\/span><\/td>\n<td><span style=\"font-weight: 400;\">T1071 Application Layer Protocol<\/span><\/td>\n<td><span style=\"font-weight: 400;\">.004 DNS<\/span><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><span style=\"font-weight: 400;\">T1132 Data Encoding<\/span><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><span style=\"font-weight: 400;\">T1568 Dynamic Resolution<\/span><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><span style=\"font-weight: 400;\">T1573 Encrypted Channel<\/span><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><span style=\"font-weight: 400;\">T1008 Fallback Channels<\/span><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><span style=\"font-weight: 400;\">T1105 Ingress Tool Transfer<\/span><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><span style=\"font-weight: 400;\">T1572 Protocol Tunneling<\/span><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><span style=\"font-weight: 400;\">T1090 Proxy<\/span><\/td>\n<td><span style=\"font-weight: 400;\">.001 Internal Proxy<\/span><\/p>\n<p><span style=\"font-weight: 400;\">.002 External Proxy<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Exfiltration<\/span><\/td>\n<td><span style=\"font-weight: 400;\">T1030 Data Transfer Size Limit<\/span><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><span style=\"font-weight: 400;\">T1048 Exfiltration Over Alternative Protocol<\/span><\/td>\n<td><span style=\"font-weight: 400;\">.001 Exfiltration Over Symmetric Encrypted Non-C2 Protocol<\/span><\/p>\n<p><span style=\"font-weight: 400;\">.002 Exfiltration Over Asymmetric Non-C2 Protocol<\/span><\/p>\n<p><span style=\"font-weight: 400;\">.003 Exfiltration Over Unencrypted Obfuscated Non-C2 Protocol<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><\/h3>\n<h3><span style=\"font-weight: 400;\">Infoblox Support for PDNS Solutions<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Infoblox BloxOne\u2122 Threat Defense provides protective DNS capabilities to defend against today&#8217;s sophisticated threats, and brings extensive threat intelligence from multiple sources. BloxOne provides the most current, comprehensive, and accurate set of malicious hostnames, domains, IP addresses, and other relevant threat indicators. This enables DNS servers to detect and block activity such as command and control (C&amp;C) communications to malicious destinations. Advanced behavioral analytics, machine learning and other advanced techniques applied to real-time DNS queries can rapidly detect and stop zero-day DNS tunneling, DGA, data exfiltration, Fast Flux, lookalike domains, and more.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Infoblox&#8217;s DDI (DNS, DHCP, IPAM database) data can further provide invaluable information about related devices and actionable network context (like what type of device it is, where it is in the network, who it is assigned to, lease history). This information can provide essential visibility into ongoing attacks and for remediation strategy.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Also, critically important is that the integration of data with SIEM and SOAR infrastructure can provide significant reductions in time for the detection of threats and the automation of incident response. When Infoblox detects something malicious, a new device, or virtual workload on the network, it automatically shares that event information and context with existing security infrastructures like endpoint EDR, SIEM, SOAR, and other solutions. This data can trigger the security tools to prevent access to the network or scan for vulnerabilities until it is deemed compliant with policy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Learn more about BloxOne Threat Defense<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/\"><span style=\"font-weight: 400;\">https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/<\/span><\/a><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Learn more about protective DNS and DNS security here:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><a href=\"https:\/\/www.infoblox.com\/dns-security-resource-center\/dns-security-faq\/what-is-protective-dns-pdns\/\"><span style=\"font-weight: 400;\">https:\/\/www.infoblox.com\/dns-security-resource-center\/dns-security-faq\/what-is-protective-dns-pdns\/<\/span><\/a><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">If you want to know more, please reach out to us directly via <\/span><a href=\"https:\/\/info.infoblox.com\/contact-form\/\"><span style=\"font-weight: 400;\">https:\/\/info.infoblox.com\/contact-form\/<\/span><\/a><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">.<\/span><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Also refer to this recent <\/span><a href=\"https:\/\/info.infoblox.com\/resources-whitepapers-gartner-how-can-organizations-use-dns-to-improve-their-security-posture.html\"><span style=\"font-weight: 400;\">Gartner report<\/span><\/a><span style=\"font-weight: 400;\">, which recommends organizations leverage DNS logs for threat detection and forensic purposes with their Security Information and Event Management platforms.<\/span><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7683\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/shields-up.png\" alt=\"\" width=\"512\" height=\"137\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/shields-up.png 512w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/shields-up-300x80.png 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Russia\u2019s invasion of Ukraine could impact organizations both within and beyond the region, including <\/span><a href=\"https:\/\/www.cisa.gov\/uscert\/russia\"><span style=\"font-weight: 400;\">malicious cyber activity<\/span><\/a><span style=\"font-weight: 400;\"> against the U.S. homeland, in response to the unprecedented economic sanctions imposed on Russia by the U.S. and our allies and partners. Evolving intelligence indicates that the Russian government is exploring options for potential cyberattacks. Every organization\u2014large and small\u2014must be prepared to respond to disruptive cyber incidents. As the nation\u2019s cyber defense agency, CISA stands ready to help organizations prepare for, respond to, and mitigate the impact of cyberattacks. When cyber incidents are reported quickly, we can use this information to render assistance and as a warning to prevent other organizations and entities from falling victim to a similar attack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Organizations should report anomalous cyber activity and\/or cyber incidents 24\/7 to report@cisa.gov or (888) 282-0870.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The UK&#8217;s prestigious National Cyber Security Centre (NCSC) has issued important recommendations for private companies and government agencies to use Protective DNS (PDNS) to secure and protect information technology assets and networks. PDNS provides key defense against malicious cyber threats and can greatly reduce the effectiveness of ransomware, phishing, botnet, and malware campaigns by blocking [&hellip;]<\/p>\n","protected":false},"author":324,"featured_media":1320,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[739,740,741,730,742,32,743],"class_list":{"0":"post-7923","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-pdns","9":"tag-protective-dns","10":"tag-ncsc","11":"tag-ncsc-uk","12":"tag-national-cyber-security-centre","13":"tag-malware","14":"tag-block-list","15":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The U.K.\u2019s NCSC Recommends Protective DNS for Government and Industry<\/title>\n<meta name=\"description\" content=\"The U.K.\u2019s NCSC Recommends Protective DNS for Government and Industry. The UK&#039;s prestigious National Cyber Security Centre (NCSC) has issued important recommendations for private companies and government agencies to use Protective DNS (PDNS) to secure and protect information technology assets and networks. PDNS provides key defense against malicious cyber threats and can greatly reduce the effectiveness of ransomware, phishing, botnet, and malware campaigns by blocking access to known malicious domains.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The U.K.\u2019s NCSC Recommends Protective DNS for Government and Industry\" \/>\n<meta property=\"og:description\" content=\"The U.K.\u2019s NCSC Recommends Protective DNS for Government and Industry. The UK&#039;s prestigious National Cyber Security Centre (NCSC) has issued important recommendations for private companies and government agencies to use Protective DNS (PDNS) to secure and protect information technology assets and networks. PDNS provides key defense against malicious cyber threats and can greatly reduce the effectiveness of ransomware, phishing, botnet, and malware campaigns by blocking access to known malicious domains.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-17T19:24:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-12T16:09:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Zuckerman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Zuckerman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\\\/\"},\"author\":{\"name\":\"Michael Zuckerman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\"},\"headline\":\"The U.K.\u2019s NCSC Recommends Protective DNS for Government and Industry\",\"datePublished\":\"2022-08-17T19:24:50+00:00\",\"dateModified\":\"2023-10-12T16:09:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\\\/\"},\"wordCount\":1530,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/459519725-660x454-1.jpg\",\"keywords\":[\"PDNS\",\"Protective DNS\",\"NCSC\",\"NCSC-UK\",\"National Cyber Security Centre\",\"Malware\",\"block list\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\\\/\",\"name\":\"The U.K.\u2019s NCSC Recommends Protective DNS for Government and Industry\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/459519725-660x454-1.jpg\",\"datePublished\":\"2022-08-17T19:24:50+00:00\",\"dateModified\":\"2023-10-12T16:09:20+00:00\",\"description\":\"The U.K.\u2019s NCSC Recommends Protective DNS for Government and Industry. The UK's prestigious National Cyber Security Centre (NCSC) has issued important recommendations for private companies and government agencies to use Protective DNS (PDNS) to secure and protect information technology assets and networks. PDNS provides key defense against malicious cyber threats and can greatly reduce the effectiveness of ransomware, phishing, botnet, and malware campaigns by blocking access to known malicious domains.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/459519725-660x454-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/459519725-660x454-1.jpg\",\"width\":660,\"height\":454,\"caption\":\"What Makes the Infoblox Security EcoSystem so Powerful?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The U.K.\u2019s NCSC Recommends Protective DNS for Government and Industry\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\",\"name\":\"Michael Zuckerman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"caption\":\"Michael Zuckerman\"},\"description\":\"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/michael-zuckerman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The U.K.\u2019s NCSC Recommends Protective DNS for Government and Industry","description":"The U.K.\u2019s NCSC Recommends Protective DNS for Government and Industry. The UK's prestigious National Cyber Security Centre (NCSC) has issued important recommendations for private companies and government agencies to use Protective DNS (PDNS) to secure and protect information technology assets and networks. PDNS provides key defense against malicious cyber threats and can greatly reduce the effectiveness of ransomware, phishing, botnet, and malware campaigns by blocking access to known malicious domains.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\/","og_locale":"en_US","og_type":"article","og_title":"The U.K.\u2019s NCSC Recommends Protective DNS for Government and Industry","og_description":"The U.K.\u2019s NCSC Recommends Protective DNS for Government and Industry. The UK's prestigious National Cyber Security Centre (NCSC) has issued important recommendations for private companies and government agencies to use Protective DNS (PDNS) to secure and protect information technology assets and networks. PDNS provides key defense against malicious cyber threats and can greatly reduce the effectiveness of ransomware, phishing, botnet, and malware campaigns by blocking access to known malicious domains.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\/","og_site_name":"Infoblox Blog","article_published_time":"2022-08-17T19:24:50+00:00","article_modified_time":"2023-10-12T16:09:20+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-1.jpg","type":"image\/jpeg"}],"author":"Michael Zuckerman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Zuckerman","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\/"},"author":{"name":"Michael Zuckerman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4"},"headline":"The U.K.\u2019s NCSC Recommends Protective DNS for Government and Industry","datePublished":"2022-08-17T19:24:50+00:00","dateModified":"2023-10-12T16:09:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\/"},"wordCount":1530,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-1.jpg","keywords":["PDNS","Protective DNS","NCSC","NCSC-UK","National Cyber Security Centre","Malware","block list"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\/","url":"https:\/\/www.infoblox.com\/blog\/security\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\/","name":"The U.K.\u2019s NCSC Recommends Protective DNS for Government and Industry","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-1.jpg","datePublished":"2022-08-17T19:24:50+00:00","dateModified":"2023-10-12T16:09:20+00:00","description":"The U.K.\u2019s NCSC Recommends Protective DNS for Government and Industry. The UK's prestigious National Cyber Security Centre (NCSC) has issued important recommendations for private companies and government agencies to use Protective DNS (PDNS) to secure and protect information technology assets and networks. PDNS provides key defense against malicious cyber threats and can greatly reduce the effectiveness of ransomware, phishing, botnet, and malware campaigns by blocking access to known malicious domains.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/459519725-660x454-1.jpg","width":660,"height":454,"caption":"What Makes the Infoblox Security EcoSystem so Powerful?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/the-u-k-s-ncsc-recommends-protective-dns-for-government-and-industry\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"The U.K.\u2019s NCSC Recommends Protective DNS for Government and Industry"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4","name":"Michael Zuckerman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","caption":"Michael Zuckerman"},"description":"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.","url":"https:\/\/www.infoblox.com\/blog\/author\/michael-zuckerman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7923","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/324"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7923"}],"version-history":[{"count":9,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7923\/revisions"}],"predecessor-version":[{"id":8980,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7923\/revisions\/8980"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1320"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}