Ensure that your Microsoft Azure DNS zones are using Domain Name System Security Extensions (DNSSEC) to protect against DNS spoofing and cache poisoning attacks. DNSSEC is a suite of extensions that enhance the security of DNS zones. It works by digitally signing DNS records, which allows DNS responses to be validated and protects them from forgery or tampering during transit. When enabled, Azure DNS generates a key-signing key (KSK) and a zone-signing key (ZSK) to sign all records within the zone.
DNSSEC provides a critical layer of authentication and integrity protection for DNS responses, effectively preventing cache poisoning and DNS spoofing attacks. Although not essential for all environments, DNSSEC is highly recommended for public-facing domains due to its role in securing online services and meeting compliance requirements. The risk assessment reflects the significant security enhancement it offers, balanced against the potential for increased operational complexity and the fact that its direct impact on end-users may be indirect in many operational contexts.
Audit
To determine if DNSSEC is enabled for your Microsoft Azure DNS zones, perform the following operations:
Remediation / Resolution
To enable and configure Domain Name System Security Extensions (DNSSEC) for your Microsoft Azure DNS zones, perform the following operations:
References
- Azure Official Documentation
- Secure your Azure DNS deployment
- DNSSEC overview
- How to sign your Azure Public DNS zone with DNSSEC
- Azure Command Line Interface (CLI) Documentation
- az account list
- az account set
- az network dns zone list
- az network dns dnssec-config show
- az network dns dnssec-config create
- az network dns record-set ds add-record