Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Ramaswamy Chandramouli; Scott W. Rose;|
|Title:||Secure Domain Name System (DNS) Deployment Guide|
|Published:||September 18, 2013|
|Abstract:||The Domain Name System (DNS) is a distributed computing system that enables access to Internet resources by user-friendly domain names rather than IP addresses, by translating domain names to IP addresses and back. The DNS infrastructure is made up of computing and communication entities called Name Servers each of which contains information about a small portion of the domain name space. The domain name data provided by DNS is intended to be available to any computer located anywhere in the Internet.This document provides deployment guidelines for securing DNS within an enterprise. Because DNS data is meant to be public, preserving the confidentiality of DNS data. The primary security goals for DNS are data integrity and source authentication, which are needed to ensure the authenticity of domain name information and maintain the integrity of domain name information in transit. This document provides extensive guidance on maintaining data integrity and performing source authentication. DNS components are often subjected to denial-of-service attacks intended to disrupt access to the resources whose domain names are handled by the attacked DNS components. This document presents guidelines for configuring DNS deployments to prevent many denial-of-service attacks that exploit vulnerabilities in various DNS components. [Supersedes SP 800-81 Rev. 1 (April 2010): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905113]|
|Citation:||Special Publication (NIST SP) - 800-81-2|
|Keywords:||Authoritative Name Server, Caching Name Server, Domain Name System (DNS), DNS Query/Response, DNS Security Extensions (DNSSEC), Resource Record (RR), Trust Anchor, Validating Resolver|
|Research Areas:||Information Technology, Computer Security|