Study: Operators should use DNSSEC to improve security

While cost and complexity turn operators off, one expert says rolling out the technology isn't as taxing as companies imagine

Various challenges are making many operators hesitate to adopt DNSSEC (Domain Name System Security Extensions) to prevent hackers from tampering with DNS information and redirecting Web traffic, according to a study from European Union's cybersecurity agency.

DNS is a key building block of the Internet. The technology's most important task is translating IP (Internet Protocol) addresses to host names, and DNSSEC is used to protect that process.

Operators agree that the deployment of DNSSEC provides a much needed improvement on security.

But 56 percent are still considering whether to implement it, and 22 percent do not plan to implement it in the next three years, according to the European Network and Information Security Agency (ENISA) study (

A lack of customer demand for DNSSEC and the cost of deployment are two of the main reasons for operators either hesitating or choosing not to implement the technology in the near future, according to ENISA.

Operators that have rolled out DNSSEC cite the complexity of deploying the technology as the greatest challenge, in part because of a lack of tools for automating the operation process.

There is also a lack of security policies focusing on DNSSEC security guidelines, key management and recommendations, ENISA said.

Putting pressure on software vendors and operators to add support for DNSSEC would get it implemented much faster, said Torbjörn Eklöv, a security expert at consulting firm Interlan, who has implemented the technology at Swedish municipalities.

The general lack of awareness and understanding of DNSSEC also means that companies overestimate the expense and difficulty of actually implementing it, said Eklöv.

He claimed that he can implement the technology at a Swedish municipality in less than a day.

Companies should spend as much energy and resources on securing DNS as they currently do on firewalls and spam protection, he said.

Join the CSO newsletter!

Error: Please check your email address.

Tags DNScyber securityDNSSEC

More about etworkSEC

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Mikael Ricknäs

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place