{"id":16345,"date":"2018-06-05T11:54:56","date_gmt":"2018-06-05T16:54:56","guid":{"rendered":"https:\/\/www.dotcom-tools.com\/blog\/?p=16345"},"modified":"2021-11-17T02:10:48","modified_gmt":"2021-11-17T08:10:48","slug":"dns-security","status":"publish","type":"post","link":"https:\/\/www.dotcom-tools.com\/web-performance\/dns-security\/","title":{"rendered":"DNS Security &#8211; Best Practices for Optimum Security"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-16352\" src=\"https:\/\/www.dotcom-tools.com\/web-performance\/wp-content\/uploads\/2018\/05\/DNS-Security-Best-Practices-for-Optimum-Security.jpg\" alt=\"\" width=\"900\" height=\"400\" srcset=\"https:\/\/www.dotcom-tools.com\/web-performance\/wp-content\/uploads\/2018\/05\/DNS-Security-Best-Practices-for-Optimum-Security.jpg 900w, https:\/\/www.dotcom-tools.com\/web-performance\/wp-content\/uploads\/2018\/05\/DNS-Security-Best-Practices-for-Optimum-Security-350x156.jpg 350w, https:\/\/www.dotcom-tools.com\/web-performance\/wp-content\/uploads\/2018\/05\/DNS-Security-Best-Practices-for-Optimum-Security-768x341.jpg 768w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/p>\n<p>These days, enterprise security goes far beyond the traditional safeguards such as physical <a href=\"https:\/\/www.securityguardtraininghq.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">on-premise security guards<\/a>, camera systems, and door alarms. Digital security is essential to the successful operations of business, and should often be the first line of defense in protecting your brand, reputation, and sensitive or <a href=\"https:\/\/www.dotcom-tools.com\/web-performance\/blog\/hipaa-compliant-wordpress-hosting\/\" target=\"_blank\" rel=\"noopener noreferrer\">protected client data<\/a>.<\/p>\n<p>Each day, millions of websites and computers are breached. While you likely hear about the countless stories of hacking and cyberattacks, it\u2019s not until it happens to you that it truly becomes real. Safeguarding your computer and network from attack requires more than protecting on-page and server databases.<\/p>\n<p>To truly maximize the stability and security of your enterprise, it\u2019s imperative to identify weaknesses in every component involved with connecting to the internet. One of the most overlooked elements of security is DNS. This essential communication protocol, which stands for Domain Name System, manages IP addresses and name server pointers for domain names.<\/p>\n<p>While this protocol has many different capabilities, the topic of security is often left unmentioned. Thankfully, solidifying the security of this essential communication protocol is easier than you may think. You simply need to follow a few best practices, as well as remain vigilant regarding <a href=\"https:\/\/www.dotcom-tools.com\/web-performance\/blog\/most-common-dns-security-issues\/\" target=\"_blank\" rel=\"noopener noreferrer\">network health and safety<\/a>.<\/p>\n<h2>Hide Primary Servers from View<\/h2>\n<p>This security best practice is generally more applicable for the server infrastructure that oversees domain names for an entire region. Regardless, it\u2019s an important factor to review even as a standard internet user.<\/p>\n<p>The main hosting servers, which store all <a href=\"https:\/\/www.dotcom-tools.com\/web-performance\/blog\/understanding-dns-record-types\/\" target=\"_blank\" rel=\"noopener noreferrer\">DNS records<\/a> for a specific region, should never be listed as an actual name server. Moreover, they should never be accessible by any end-user. This is important to safeguard entrance and prevent malicious attacks, which could destroy an entire zone or region.<\/p>\n<h2>Focus on Localized Users<\/h2>\n<p>Whenever you can, try to assign name servers that are geographically close to the bulk of your end-users. An excellent example of this technique is to choose a name server organization that hosts name servers at various locations throughout a specific geographic area.<\/p>\n<p>This reduces server strain, and results in faster connections, as requests are distributed to specific servers based on end-user proximity, as well as clustered server strains. Ultimately, this results in faster performance, but also minimizes the risk of an isolated attacks negatively affecting an entire zone or region.<\/p>\n<h3>Protected Zone Transfers<\/h3>\n<p>As an added level of security, make sure the DNS data transfers are zone-protected. This means the on-server configuration offers ACLs, or <a href=\"https:\/\/searchsoftwarequality.techtarget.com\/definition\/access-control-list\" target=\"_blank\" rel=\"noopener noreferrer\">Access Control Lists<\/a>, as well as <a href=\"https:\/\/simpledns.com\/help\/definition-tsig\" target=\"_blank\" rel=\"noopener noreferrer\">TSIGs<\/a>, or Transaction Signatures. Of course, these should be used in conjunction with firewalls. This allows all zone data transfer requests to be carefully monitored and protected. This security feature protects the main server, as well as secondary zone servers.<\/p>\n<h3>Be Mindful of DNS Cache Attacks<\/h3>\n<p>One of the most common weaknesses, <a href=\"https:\/\/www.dotcom-tools.com\/web-performance\/blog\/common-problems-with-dns\/\" target=\"_blank\" rel=\"noopener noreferrer\">or security flaws<\/a>, when it comes to DNS protocols is cache poisoning. This occurs when data is cached from sources not approved or authorized by a network. Typically, this is a sign of a malicious attack, which causes disruptions to the actual domain name visitors are taken to.<\/p>\n<p>For example, your end-users go to your domain, but are automatically redirected to a malicious spam site. There are multiple ways to prevent this from happening, but the most effective maintenance task is performing a DNS cache flush.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>These days, enterprise security goes far beyond the traditional safeguards such as physical on-premise security guards, camera systems, and door alarms. Digital security is essential to the successful operations of business, and should often be the first line of defense in protecting your brand, reputation, and sensitive or protected client data. Each day, millions of&hellip;<\/p>\n","protected":false},"author":6,"featured_media":16352,"comment_status":"open","ping_status":"open","sticky":false,"template":"template-url.php","format":"standard","meta":[],"categories":[7],"tags":[78,85,82],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v17.6 (Yoast SEO v19.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>DNS Security - Best Practices for Optimum Security<\/title>\r\n<meta name=\"description\" content=\"One of the most overlooked elements of security is DNS. This essential communication protocol, which stands for Domain Name System, manages IP addresses and name server pointers for domain names. Learn the best practices for DNS security optimization here.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.dotcom-tools.com\/web-performance\/dns-security\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"DNS Security - Best Practices for Optimum Security\" \/>\r\n<meta property=\"og:description\" content=\"One of the most overlooked elements of security is DNS. This essential communication protocol, which stands for Domain Name System, manages IP addresses and name server pointers for domain names. Learn the best practices for DNS security optimization here.\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.dotcom-tools.com\/web-performance\/dns-security\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Dotcom-Monitor Tools Blog\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dotcommonitor\" \/>\r\n<meta property=\"article:published_time\" content=\"2018-06-05T16:54:56+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2021-11-17T08:10:48+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/www.dotcom-tools.com\/web-performance\/wp-content\/uploads\/2018\/05\/DNS-Security-Best-Practices-for-Optimum-Security.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"900\" \/>\r\n\t<meta property=\"og:image:height\" content=\"400\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"twitter:card\" content=\"summary\" \/>\r\n<meta name=\"twitter:creator\" content=\"@dotcom_monitor\" \/>\r\n<meta name=\"twitter:site\" content=\"@dotcom_monitor\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matt Schmitz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dotcom-tools.com\/web-performance\/#website\",\"url\":\"https:\/\/www.dotcom-tools.com\/web-performance\/\",\"name\":\"Dotcom-Monitor Tools Blog\",\"description\":\"Let&#039;s Make the Web a Faster Place.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dotcom-tools.com\/web-performance\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dotcom-tools.com\/web-performance\/dns-security\/#primaryimage\",\"url\":\"https:\/\/www.dotcom-tools.com\/web-performance\/wp-content\/uploads\/2018\/05\/DNS-Security-Best-Practices-for-Optimum-Security.jpg\",\"contentUrl\":\"https:\/\/www.dotcom-tools.com\/web-performance\/wp-content\/uploads\/2018\/05\/DNS-Security-Best-Practices-for-Optimum-Security.jpg\",\"width\":900,\"height\":400},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dotcom-tools.com\/web-performance\/dns-security\/#webpage\",\"url\":\"https:\/\/www.dotcom-tools.com\/web-performance\/dns-security\/\",\"name\":\"DNS Security - Best Practices for Optimum Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.dotcom-tools.com\/web-performance\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.dotcom-tools.com\/web-performance\/dns-security\/#primaryimage\"},\"datePublished\":\"2018-06-05T16:54:56+00:00\",\"dateModified\":\"2021-11-17T08:10:48+00:00\",\"author\":{\"@id\":\"https:\/\/www.dotcom-tools.com\/web-performance\/#\/schema\/person\/84f55a21a34f808cb7cc381f7f580ebb\"},\"description\":\"One of the most overlooked elements of security is DNS. This essential communication protocol, which stands for Domain Name System, manages IP addresses and name server pointers for domain names. Learn the best practices for DNS security optimization here.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.dotcom-tools.com\/web-performance\/dns-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dotcom-tools.com\/web-performance\/dns-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dotcom-tools.com\/web-performance\/dns-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.dotcom-tools.com\/web-performance\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DNS Security &#8211; Best Practices for Optimum Security\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.dotcom-tools.com\/web-performance\/#\/schema\/person\/84f55a21a34f808cb7cc381f7f580ebb\",\"name\":\"Matt Schmitz\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dotcom-tools.com\/web-performance\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/78f5aac7d4727a530bbb530b52140067?s=96&d=retro&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/78f5aac7d4727a530bbb530b52140067?s=96&d=retro&r=pg\",\"caption\":\"Matt Schmitz\"},\"description\":\"Matt Schmitz is a web performance engineer and director of Dotcom-Monitor\u2019s web performance division. Matt is a leading authority on page speed optimization and has been featured by a number of web performance blogs and media outlets. When he\u2019s not working to make the web a faster place, Matt\u2019s interests include gaming, cryptocurrency, and martial arts.\",\"url\":\"https:\/\/www.dotcom-tools.com\/web-performance\/author\/schmitzm\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DNS Security - Best Practices for Optimum Security","description":"One of the most overlooked elements of security is DNS. This essential communication protocol, which stands for Domain Name System, manages IP addresses and name server pointers for domain names. Learn the best practices for DNS security optimization here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dotcom-tools.com\/web-performance\/dns-security\/","og_locale":"en_US","og_type":"article","og_title":"DNS Security - Best Practices for Optimum Security","og_description":"One of the most overlooked elements of security is DNS. This essential communication protocol, which stands for Domain Name System, manages IP addresses and name server pointers for domain names. Learn the best practices for DNS security optimization here.","og_url":"https:\/\/www.dotcom-tools.com\/web-performance\/dns-security\/","og_site_name":"Dotcom-Monitor Tools Blog","article_publisher":"https:\/\/www.facebook.com\/dotcommonitor","article_published_time":"2018-06-05T16:54:56+00:00","article_modified_time":"2021-11-17T08:10:48+00:00","og_image":[{"width":900,"height":400,"url":"https:\/\/www.dotcom-tools.com\/web-performance\/wp-content\/uploads\/2018\/05\/DNS-Security-Best-Practices-for-Optimum-Security.jpg","type":"image\/jpeg"}],"twitter_card":"summary","twitter_creator":"@dotcom_monitor","twitter_site":"@dotcom_monitor","twitter_misc":{"Written by":"Matt Schmitz","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.dotcom-tools.com\/web-performance\/#website","url":"https:\/\/www.dotcom-tools.com\/web-performance\/","name":"Dotcom-Monitor Tools Blog","description":"Let&#039;s Make the Web a Faster Place.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dotcom-tools.com\/web-performance\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dotcom-tools.com\/web-performance\/dns-security\/#primaryimage","url":"https:\/\/www.dotcom-tools.com\/web-performance\/wp-content\/uploads\/2018\/05\/DNS-Security-Best-Practices-for-Optimum-Security.jpg","contentUrl":"https:\/\/www.dotcom-tools.com\/web-performance\/wp-content\/uploads\/2018\/05\/DNS-Security-Best-Practices-for-Optimum-Security.jpg","width":900,"height":400},{"@type":"WebPage","@id":"https:\/\/www.dotcom-tools.com\/web-performance\/dns-security\/#webpage","url":"https:\/\/www.dotcom-tools.com\/web-performance\/dns-security\/","name":"DNS Security - Best Practices for Optimum Security","isPartOf":{"@id":"https:\/\/www.dotcom-tools.com\/web-performance\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dotcom-tools.com\/web-performance\/dns-security\/#primaryimage"},"datePublished":"2018-06-05T16:54:56+00:00","dateModified":"2021-11-17T08:10:48+00:00","author":{"@id":"https:\/\/www.dotcom-tools.com\/web-performance\/#\/schema\/person\/84f55a21a34f808cb7cc381f7f580ebb"},"description":"One of the most overlooked elements of security is DNS. This essential communication protocol, which stands for Domain Name System, manages IP addresses and name server pointers for domain names. Learn the best practices for DNS security optimization here.","breadcrumb":{"@id":"https:\/\/www.dotcom-tools.com\/web-performance\/dns-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dotcom-tools.com\/web-performance\/dns-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.dotcom-tools.com\/web-performance\/dns-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dotcom-tools.com\/web-performance\/"},{"@type":"ListItem","position":2,"name":"DNS Security &#8211; Best Practices for Optimum Security"}]},{"@type":"Person","@id":"https:\/\/www.dotcom-tools.com\/web-performance\/#\/schema\/person\/84f55a21a34f808cb7cc381f7f580ebb","name":"Matt Schmitz","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dotcom-tools.com\/web-performance\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/78f5aac7d4727a530bbb530b52140067?s=96&d=retro&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/78f5aac7d4727a530bbb530b52140067?s=96&d=retro&r=pg","caption":"Matt Schmitz"},"description":"Matt Schmitz is a web performance engineer and director of Dotcom-Monitor\u2019s web performance division. Matt is a leading authority on page speed optimization and has been featured by a number of web performance blogs and media outlets. When he\u2019s not working to make the web a faster place, Matt\u2019s interests include gaming, cryptocurrency, and martial arts.","url":"https:\/\/www.dotcom-tools.com\/web-performance\/author\/schmitzm\/"}]}},"_links":{"self":[{"href":"https:\/\/www.dotcom-tools.com\/web-performance\/wp-json\/wp\/v2\/posts\/16345"}],"collection":[{"href":"https:\/\/www.dotcom-tools.com\/web-performance\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dotcom-tools.com\/web-performance\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dotcom-tools.com\/web-performance\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dotcom-tools.com\/web-performance\/wp-json\/wp\/v2\/comments?post=16345"}],"version-history":[{"count":8,"href":"https:\/\/www.dotcom-tools.com\/web-performance\/wp-json\/wp\/v2\/posts\/16345\/revisions"}],"predecessor-version":[{"id":17768,"href":"https:\/\/www.dotcom-tools.com\/web-performance\/wp-json\/wp\/v2\/posts\/16345\/revisions\/17768"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dotcom-tools.com\/web-performance\/wp-json\/wp\/v2\/media\/16352"}],"wp:attachment":[{"href":"https:\/\/www.dotcom-tools.com\/web-performance\/wp-json\/wp\/v2\/media?parent=16345"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dotcom-tools.com\/web-performance\/wp-json\/wp\/v2\/categories?post=16345"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dotcom-tools.com\/web-performance\/wp-json\/wp\/v2\/tags?post=16345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}