Infrastructure Security · IS-Q19B

Bonus Question: Are DNS and DHCP services hardened and monitored for abuse or spoofing?

Why This Matters

DNS and DHCP are foundational network services. Compromise or spoofing can redirect traffic, enable exfiltration, or disrupt operations.

Maturity

0 — Unaware
Unsecured DNS/DHCP; no logging or validation.
1 — Ad Hoc
Default configurations; reactive fixes.
2 — Defined
Hardened configuration and basic logging enabled.
3 — Managed
DNSSEC and dynamic update controls implemented.
4 — Integrated
Abuse detection and alerting integrated with SIEM.
5 — Optimized
Threat-intel correlation and anomaly detection automated.

How to Level Up

| From → To | Actions | |—|—| | 0 → 1 |Harden DNS/DHCP servers and enable logging.|
| 1 → 2 |Apply access controls and restrict zone transfers.|
| 2 → 3 |Enable DNSSEC and monitor updates.|
| 3 → 4 |Integrate logs with SIEM for alerting.|
| 4 → 5 |Correlate with threat feeds for spoofing attempts. |

Enablers

Evidence

KPIs

Low-Cost / Open-Source Options (MSME)

| Purpose | Tool | Notes | |—|—|—| | DNS server | Bind / Unbound | Enable DNSSEC |
| Monitoring | Zeek | Detect anomalous queries |
| SIEM | Wazuh / ELK | Central alerting |

Common Pitfalls

Compliance Mapping

| Standard | Clauses / Notes | |—|—| | ISO/IEC 27001 | A.8.23 / A.8.24 | | NIST CSF 2.0 | DE.CM / PR.PT | | CERT-In 2022 | Section 17 | | NIRMATA Mapping | IS-Q19B expands Infrastructure Security with DNS/DHCP integrity controls. |