Nearly a decade ago, DNS wasn’t on any security practitioner’s radar when it came to conducting security assessments. Fast-forward to today and things have changed quite a bit, but not enough, according to Merike Kaeo, CTO at Farsight Security. Having a long-standing history of doing security assessments, Kaeo can point to many examples where organizations can’t keep track of their domains or are doing so ineffectively.
When it comes to taking a secure approach to your DNS ecosystem, having a successful strategy means having the ability to determine and detect if a malicious actor is attempting to compromise your DNS infrastructure.
“Any organization has to understand the entire DNS ecosystem that they’re using,” Kaeo told InfoSec Insider during a recent interview shot at the RSA Conference in San Francisco. “[Today], every organization needs to understand what domain names are registered, who are they registered with, and who is doing the overall architecture of the entire DNS to make sure there’s a comprehensive strategy.”
In the featured video interview below, Kaeo discusses why DNS is still be underutilized as a security tool today, shares some examples of lessons-learned that could apply to you, and provides steps you can take to ensure you’re taking advantage of your DNS infrastructure to take the right defensive measure to protect your organization.