While it is possible to implement DNSSEC in software, attackers can gain access to signing keys and compromise the DNS query process


The domain name system (DNS) is effectively the Internet’s address book; it enables website names to be matched to their corresponding registered IP addresses. But illicit alteration of web queries can point end users or services to rogue IP addresses and route them to illegitimate servers for the purpose of data theft. The Domain Name System Security Extensions (DNSSEC) have been created in response to this threat. DNSSEC is a mechanism that involves the use of digital signatures to enable servers to authenticate and verify the integrity of DNS responses to queries.

Risks Associated with DNSSEC
  • Attackers who gain access to your DNS process can lure customers to a site that pretends to be yours, tricking them into providing private information.
  • While it is possible to implement DNSSEC in software, attackers can gain access to signing keys and compromise the DNS query process.
DNSSEC: Thales eSecurity Solutions

Products and services from Thales eSecurity can help you deploy a high-assurance DNSSEC process that protects your business and your customers’ information while at the same time delivering the performance your business requires. nShield Hardware Security Modules (HSMs) enable top level domains (TLDs), registrars, registries and enterprises to secure critically important signing processes used to validate the integrity of DNSSEC responses across the Internet, and protect the DNS from what are commonly referred to as “cache poisoning” and “man-in-the-middle” attacks. HSMs provide proven and auditable security advantages, enabling proper generation and storage for signing keys to assure the integrity of the DNSSEC validation process.

Benefits Delivered by Thales eSecurity Solutions
  • Ensure integrity of the DNSSEC validation process with independently certified HSMs (FIPS 140-2 Level 3 and Common Criteria EAL4+).
  • Maintain a robust tamper-resistant hardware boundary and a proven, auditable mechanism to protect valuable signing keys, even when archived.
  • Enforce separation of duties through robust access controls to mitigate the threat of single “super users” and facilitate regulatory compliance.
  • Achieve high availability and improved DNS server performance with unlimited key storage, secure backup and recovery, and powerful cryptographic acceleration.


Watch our interactive demo Explore
Schedule a live demo Schedule
Get in contact with a specialist Contact us