DNS Registrar — Security Checklist
Domain registration security, DNS configuration, access control, and monitoring.
1. Governance & Domain Management
-
Domain Management Policies and ProceduresDo you maintain documented policies and procedures governing domain management operations?
-
Accountability for Domain SecurityIs there a clearly designated person or team accountable for domain security (policy maintenance, security reviews, renewal management)?
-
Domain Inventory and AttributesDo you maintain a comprehensive inventory of all domains including ownership, purpose, criticality classification, expiration dates, and relationships to business services/applications?
-
Current Configuration Baselines for Critical DomainsDo you document and maintain current configuration baselines for all critical domains (DNS records, security settings, registrar configurations)?
Notes:
2. Risk Assessment & Classification
-
Formal Domain Classification SystemDo you maintain a formal classification system for domains based on criticality, financial exposure, and operational impact?
-
Mapping Domain Classifications to ControlsDo you map domain classifications to required security controls (monitoring frequency, approval requirements, backup procedures)?
-
Registrar and DNS Provider Security CriteriaDo you maintain security evaluation criteria for selecting domain registrars and DNS hosting providers?
Notes:
3. Access Control & Authentication
-
Procedures for Registrar AccessDo you maintain documented procedures for managing access to domain registrar accounts?
-
Multi-factor Authentication for Registrar AccountsDo you enforce multi-factor authentication requirements for all registrar and DNS management accounts?
-
Dedicated Domain Security Contact EmailDo you maintain a separate, dedicated security contact email for domain management that is independent from your primary domain?
-
Periodic Access Reviews for Domain PrivilegesDo you conduct periodic access reviews for all personnel with domain management privileges?
-
Approval Workflows for Critical Domain OperationsDo you maintain documented approval workflows for critical domain operations (transfers, deletions, nameserver changes)?
Notes:
4. Technical Security Controls
-
DNS Security Configuration StandardsDo you maintain documented standards for DNS security configurations (DNSSEC, CAA records, TTL policies)?
-
Email Authentication Protocol StandardsDo you maintain documented standards for email authentication (SPF, DKIM, DMARC, MTA-STS)?
-
DMARC Monitoring and Response ProceduresDo you have procedures for monitoring and responding to DMARC reports and policy violations?
-
Documented Domain Lock ProceduresDo you maintain documented procedures for implementing domain locks (transfer locks, registry locks, EPP status codes)?
-
Out of Band Domain Change VerificationDo you have procedures for out-of-band verification of domain changes through registrar support channels?
-
TLS Certificate Lifecycle Management ProceduresDo you maintain documented procedures for TLS certificate lifecycle management, including issuance, renewal, revocation, and monitoring for expiration across all domains and services?
Notes:
5. Operational Procedures
-
Domain Registration Lifecycle ProceduresDo you maintain documented procedures for domain registration, renewal, decommissioning, and expiration prevention (auto-renewal, multiple reminders, backup payment methods)?
-
Secure Domain Transfer ProceduresDo you maintain documented procedures for secure domain transfers between registrars?
-
DNS Change Management ProceduresDo you maintain formal change management procedures for DNS record modifications?
Notes:
6. Monitoring & Detection
-
Continuous Monitoring for DNS ChangesDo you maintain continuous monitoring for unauthorized DNS record changes across all critical domains?
-
DNS Compromise Indicators MonitoringDo you monitor for specific indicators of DNS compromise (TTL changes, nameserver modifications, record anomalies)?
-
Monitor Certificate Transparency LogsDo you maintain procedures for monitoring Certificate Transparency logs for unauthorized certificate issuance?
-
Unauthorized Domain Registration MonitoringDo you monitor domain registration status and registrar lock settings for unauthorized changes?
-
Detecting Domain Expiration RisksDo you maintain procedures for detecting and responding to domain expiration risks?
Notes:
7. Incident Response
-
Domain Hijacking Incident ResponseDo you maintain incident response procedures specific to domain hijacking and DNS compromise scenarios?
-
Registrar and DNS Emergency ContactsDo you maintain emergency contact information for registrars and DNS hosting providers?
-
Emergency Registry Lock ActivationDo you maintain procedures for emergency registry lock activation to prevent unauthorized domain changes?
-
Regaining Control of Compromised DomainsDo you have documented procedures for regaining control of compromised domains?
-
DNS Record Integrity Validation ProceduresDo you maintain procedures for validating DNS record integrity after incident recovery?
Notes: