NIST Updates DNS Security Guidance After 12 Years with SP 800-81r3
嗯,用户让我总结这篇文章的内容,控制在100字以内,而且不需要用特定的开头。首先,我需要通读整篇文章,抓住主要信息。 文章主要讲的是NIST发布的最新DNS安全指南,取代了2013年的版本。DNS在互联网中的基础作用很重要,但安全措施一直滞后。这次更新强调了DNS作为主动安全控制层的重要性,提到了“保护性DNS”和加密DNS协议如DoT、DoH、DoQ。还提到了DNSSEC的更新和基础设施的安全建议。 接下来,我需要把这些要点浓缩到100字以内。确保涵盖NIST的更新、DNS的重要性、保护性DNS、加密协议、以及基础设施建议。 可能的结构是:NIST发布新指南,取代旧版;强调DNS作为主动安全层;介绍保护性DNS和加密协议;提到DNSSEC和基础设施建议;最后说明其重要性。 检查一下字数,确保不超过限制。可能需要调整措辞,使句子更简洁。 最终总结应该清晰明了,涵盖所有关键点。 </think> NIST发布最新DNS安全指南(SP 800-81r3),取代2013年版本。指南强调将DNS作为主动安全控制层,引入“保护性DNS”概念,并推荐使用云和本地结合的部署模式。同时要求采用加密DNS协议(如DoT、DoH、DoQ),并更新了DNSSEC算法建议及密钥管理措施。指南还针对基础设施安全提出多项建议,旨在提升企业网络安全策略中的DNS重要性。 2026-3-23 09:49:5 Author: thecyberexpress.com(查看原文) 阅读量:7 收藏

The latest update to DNS security guidance from the National Institute of Standards and Technology (NIST) marks a new in how organizations are expected to secure one of the internet’s most critical systems. Published as NIST SP 800-81r3, this revision replaces the previous 2013 version, ending a gap of more than twelve years without major federal updates in this area. 

DNS, or the Domain Name System, plays a foundational role in virtually every network connection. Despite this, its security practices have historically lagged behind other parts of enterprise infrastructure. With SP 800-81r3, NIST brings modern threats, technologies, and operational realities into focus, offering updated DNS security guidance for both leadership and technical teams. 

A Modern Approach to DNS Security Guidance 

The revised NIST SP 800-81r3 document is structured around three core pillars: using DNS as a proactive security control, strengthening the DNS protocol itself, and securing the infrastructure that supports DNS services. Importantly, the guidance is tailored for two audiences: executives making strategic cybersecurity decisions, and the operational teams responsible for implementation and maintenance. 

One of the most notable shifts in this DNS security guidance is the emphasis on DNS as more than just a lookup service. Instead, it is positioned as an active enforcement layer capable of detecting and mitigating threats in real time. 

Protective DNS Takes Center Stage 

A major highlight of SP 800-81r3 is its focus on “protective DNS.” This concept refers to DNS services enhanced with security capabilities that can inspect queries and responses, block malicious domains, filter content categories, and generate logs for forensic analysis and incident response. 

The document outlines two primary deployment models: 

report-ad-banner

  • Cloud-based protective DNS services  
  • On-premises solutions using DNS firewalls or Response Policy Zones (RPZs)  

NIST recommends a hybrid approach wherever possible, noting that combining cloud services with on-premises fallback ensures resilience even during outages. The DNS security guidance also stresses integrating DNS logs with SIEM platforms and correlating them with DHCP lease data to map activity to specific devices during investigations. 

Encrypted DNS Reshapes Network Visibility 

Another major area covered in NIST SP 800-81r3 is encrypted with DNS. The document discusses three key protocols: 

  • DNS over TLS (DoT) on TCP port 853  
  • DNS over HTTPS (DoH) on TCP/UDP port 443  
  • DNS over QUIC (DoQ) on UDP port 853  

These protocols encrypt communication between clients and DNS resolvers, improving privacy and integrity. However, they also shift the security burden. NIST mandates encrypted DNS for U.S. federal civilian agencies wherever technically feasible. At the same time, the DNS security guidance warns that organizations must configure browsers and applications carefully to ensure they do not bypass internal DNS controls. 

To maintain control, the guidance recommends: 

  • Blocking unauthorized DoT traffic via TCP port 853  
  • Restricting DoH using firewall rules and RPZs  
  • Using mobile device management tools to enforce DNS settings  

Updated DNSSEC and Cryptographic Practices 

The SP 800-81r3 update also modernizes DNSSEC recommendations. It aligns supported algorithms with RFC 8624 and NIST SP 800-57, including: 

  • RSA with SHA-256  
  • ECDSA P-256 and P-384  
  • Ed25519 and Ed448  

The guidance favors ECDSA and Edwards-curve algorithms due to their smaller key sizes, which help keep DNS responses efficient and avoid fallback to TCP. 

Key management is another focus. DNSSEC signing keys should have lifetimes of one to three years, while RRSIG validity should remain short, around five to seven days, to limit exposure if a key is compromised. Hardware security modules are recommended for safeguarding private keys. 

Interestingly, the document prefers NSEC over NSEC3 for authenticated denial of existence, noting that NSEC3’s added computational cost often outweighs its benefits. However, organizations required to use NSEC3 are directed to RFC 9276 for safer parameter configurations. 

Post-quantum cryptography is not yet included, but NIST advises organizations to prepare for future migration. 

Strengthening DNS Infrastructure and Operations 

Beyond protocols, this DNS security guidance dives into operational risks. It highlights issues such as: 

  • Dangling CNAME records, which can allow attackers to take control of unresolved domains  
  • Lame delegations, where DNS authority is misconfigured  

To mitigate these risks, organizations are encouraged to monitor domain registrations for typosquatting and maintain retired domains in a parked state to prevent malicious reuse. 

TTL values are also addressed, with recommendations ranging from 1,800 seconds (30 minutes) to 86,400 seconds (one day). A TTL of zero is explicitly prohibited, and values below 30 seconds are discouraged for DNSSEC-signed records. 

Architecture and Availability Best Practices 

Finally, NIST SP 800-81r3 reinforces architectural best practices. It strongly advises separating authoritative and recursive DNS functions on internet-facing servers, as combining them introduces security risks. 

Other recommendations include: 

  • Deploying at least two authoritative servers on separate networks  
  • Distributing servers geographically across multiple sites  
  • Using a hidden primary server to reduce exposure to attacks  

Dedicated infrastructure for DNS is preferred to minimize the attack surface and ensure sufficient resources for logging and security features. Where full separation is not feasible, combining DNS with closely related services like DHCP is considered acceptable. 

Overall, this updated DNS security guidance from NIST represents a comprehensive modernization of how organizations should approach DNS. With SP 800-81r3, DNS is no longer treated as a passive service but as a central pillar of enterprise cybersecurity strategy. 


文章来源: https://thecyberexpress.com/dns-security-guidance-nist-sp-800-81r3-update/
如有侵权请联系:admin#unsafe.sh