{"id":8666,"date":"2020-02-06T08:44:02","date_gmt":"2020-02-06T13:44:02","guid":{"rendered":"https:\/\/www.cscdigitalbrand.services\/blog\/?p=8666"},"modified":"2026-01-19T09:24:13","modified_gmt":"2026-01-19T14:24:13","slug":"domain-name-registrar-security-controls-and-processes","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/domain-name-registrar-security-controls-and-processes\/","title":{"rendered":"What\u2019s the Point of Domain Name Registrar Security, Controls, and Processes?"},"content":{"rendered":"\n<p>In my recent CircleID post, <a href=\"http:\/\/www.circleid.com\/posts\/20191218_dns_domain_names_certificates_missing_links_in_most_cybersecurity\/\">DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures<\/a>, I highlighted the significance of applying multiple layers of defense to secure online, business-critical assets. On Friday, January 24, 2020, Brian Krebs\u2014the world-renowned cyber security journalist\u2014reiterated the critical importance of domain name security in reference to the domain name \u201ce-hawk.net\u201d being stolen from its rightful owner by targeting the domain name registrar. <\/p>\n\n\n\n<p>From my perspective, the reason for this business risk is a general lack of awareness related to domain name and DNS hijacking\u2014and most domain name registrars do not support the registry lock protocol. However security warnings came from FireEye\u2019s Mandiant team in early 2019 about a <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2019\/01\/global-dns-hijacking-campaign-dns-record-manipulation-at-scale.html\">global DNS hijacking campaign<\/a> that appeared to be connected to the Iranian government. This prompted the Department of Homeland Security to issue an emergency directive about mitigating the risk of DNS hijacking.<\/p>\n\n\n\n<p>Cyber criminals are taking advantage of this risk and have been doing so for quite some time.&nbsp; Throughout 2019, Cisco Talos warned about the <a href=\"https:\/\/blog.talosintelligence.com\/2019\/04\/seaturtle.html\">state-sponsored Sea Turtle attack<\/a> taking control of DNS systems, and surmised that \u201cthe actor ultimately intended to steal credentials to gain access to networks and systems of interest.\u201d And just this week, Reuters reported \u201c<a href=\"https:\/\/www.reuters.com\/article\/us-cyber-attack-hijack-exclusive-idUSKBN1ZQ10X\">Exclusive: Hackers acting in Turkey&#8217;s interests believed to be behind recent cyberattacks \u2013 sources<\/a>\u201d that another group of hackers alleged to be working for the Turkish government\u2019s interests attacked government organizations and companies via DNS hijacking.<\/p>\n\n\n\n<p>In his story, <a href=\"https:\/\/krebsonsecurity.com\/2020\/01\/does-your-domain-have-a-registry-lock\/\">Does\nYour Domain Have a Registry Lock?<\/a>, Krebs walks through\nmeasures companies implement to protect their vital domain names. He also states\nthat the majority of organizations\u2014regardless of industry or geographic\nlocation, including the Forbes Global 2000\u2014are at risk, because less than 25% of\ncompanies have adopted the registry lock protocol. &nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Best practices to maximize security against domain name and DNS hijacking*\n<\/strong><\/h4>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Use registration<br \/>features like registry lock to protect domain name records from being changed.<br \/>Note: this will increase the time it takes to make changes to your locked<br \/>domain.<\/li>\n\n\n\n<li>Use DNS security<br \/>extensions (DNSSEC), both signing zones and validating responses.<\/li>\n\n\n\n<li>Use access control<br \/>lists for applications, internet traffic, and monitoring.<\/li>\n\n\n\n<li>Use two-factor<br \/>authentication, and require it to be used by all relevant users and<br \/>subcontractors.<\/li>\n\n\n\n<li>Choose unique<br \/>passwords and consider using a password manager.<\/li>\n\n\n\n<li>Review the security<br \/>of existing accounts with all providers, and make sure you have multiple<br \/>notifications in place for when a domain you own is about to expire.<\/li>\n\n\n\n<li>Monitor the<br \/>issuance of new digital certificates for your domains; keep track through&nbsp;<a href=\"https:\/\/www.certificate-transparency.org\/how-ct-works\" target=\"_blank\" rel=\"noreferrer noopener\">certificate transparency logs<\/a>, for example.<\/li>\n<\/ol>\n\n\n\n<p>Furthermore, domain name registrars have varied controls, processes, and security measures. When assessing your domain name registrar\u2019s capabilities, validate they\u2019re applying a defense-in-depth approach to secure your vital domain names.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Are they Internet Corporation for Assigned Name and<br \/>Numbers (ICANN) and registry accredited with enterprise-class technology and<br \/>operations processes?<\/li>\n\n\n\n<li>Do they provide secure portal access with two-factor<br \/>authentication?<\/li>\n\n\n\n<li>Do they help apply advanced security features like registry<br \/>lock, DNSSEC, domain-based message<br \/>authentication reporting and conformance (DMARC), and certification<br \/>authority authorization (CAA) records?<\/li>\n\n\n\n<li>Do they allow for the control of user permissions?<\/li>\n\n\n\n<li>Do they help identify vital domain names and provide<br \/>continuous monitoring and alerting?<\/li>\n<\/ul>\n\n\n\n<p>Ask your domain name registrar these tough questions because they hold\nthe \u201ckeys to the kingdom,\u201d which if not secured properly, can jeopardize your\ncompany\u2019s reputation, finances, security, data, and intellectual property.<\/p>\n\n\n\n<p><strong>*<\/strong><strong>Source: <\/strong><a href=\"https:\/\/krebsonsecurity.com\/2020\/01\/does-your-domain-have-a-registry-lock\/\"><strong>krebsonsecurity.com\/2020\/01\/does-your-domain-have-a-registry-lock\/<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In my recent CircleID post, DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures, I highlighted the significance of applying multiple layers of defense to secure online, business-critical assets. On Friday, January 24, 2020, Brian Krebs\u2014the world-renowned cyber security journalist\u2014reiterated the critical importance of domain name security in reference to [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9,171,521],"tags":[],"class_list":["post-8666","post","type-post","status-publish","format-standard","hentry","category-brands","category-cyber-security","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What\u2019s the Point of Domain Name Registrar Security, Controls, and Processes? | CSC<\/title>\n<meta name=\"description\" content=\"In my recent CircleID post, DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures, I highlighted the significance of\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/domain-name-registrar-security-controls-and-processes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What\u2019s the Point of Domain Name Registrar Security, Controls, and Processes? | CSC\" \/>\n<meta property=\"og:description\" content=\"In my recent CircleID post, DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures, I highlighted the significance of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/domain-name-registrar-security-controls-and-processes\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-06T13:44:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-19T14:24:13+00:00\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-name-registrar-security-controls-and-processes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-name-registrar-security-controls-and-processes\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"What\u2019s the Point of Domain Name Registrar Security, Controls, and Processes?\",\"datePublished\":\"2020-02-06T13:44:02+00:00\",\"dateModified\":\"2026-01-19T14:24:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-name-registrar-security-controls-and-processes\\\/\"},\"wordCount\":571,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"articleSection\":[\"Brand Protection\",\"Cyber security\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-name-registrar-security-controls-and-processes\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-name-registrar-security-controls-and-processes\\\/\",\"name\":\"What\u2019s the Point of Domain Name Registrar Security, Controls, and Processes? | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"datePublished\":\"2020-02-06T13:44:02+00:00\",\"dateModified\":\"2026-01-19T14:24:13+00:00\",\"description\":\"In my recent CircleID post, DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures, I highlighted the significance of\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-name-registrar-security-controls-and-processes\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-name-registrar-security-controls-and-processes\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/domain-name-registrar-security-controls-and-processes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What\u2019s the Point of Domain Name Registrar Security, Controls, and Processes?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What\u2019s the Point of Domain Name Registrar Security, Controls, and Processes? | CSC","description":"In my recent CircleID post, DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures, I highlighted the significance of","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/domain-name-registrar-security-controls-and-processes\/","og_locale":"en_US","og_type":"article","og_title":"What\u2019s the Point of Domain Name Registrar Security, Controls, and Processes? | CSC","og_description":"In my recent CircleID post, DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures, I highlighted the significance of","og_url":"https:\/\/www.cscdbs.com\/blog\/domain-name-registrar-security-controls-and-processes\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2020-02-06T13:44:02+00:00","article_modified_time":"2026-01-19T14:24:13+00:00","author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/domain-name-registrar-security-controls-and-processes\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/domain-name-registrar-security-controls-and-processes\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"What\u2019s the Point of Domain Name Registrar Security, Controls, and Processes?","datePublished":"2020-02-06T13:44:02+00:00","dateModified":"2026-01-19T14:24:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/domain-name-registrar-security-controls-and-processes\/"},"wordCount":571,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"articleSection":["Brand Protection","Cyber security","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/domain-name-registrar-security-controls-and-processes\/","url":"https:\/\/www.cscdbs.com\/blog\/domain-name-registrar-security-controls-and-processes\/","name":"What\u2019s the Point of Domain Name Registrar Security, Controls, and Processes? | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"datePublished":"2020-02-06T13:44:02+00:00","dateModified":"2026-01-19T14:24:13+00:00","description":"In my recent CircleID post, DNS, Domain Names, and Certificates: The Missing Links in Most Cyber Security Risk Postures, I highlighted the significance of","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/domain-name-registrar-security-controls-and-processes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/domain-name-registrar-security-controls-and-processes\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/domain-name-registrar-security-controls-and-processes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What\u2019s the Point of Domain Name Registrar Security, Controls, and Processes?"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8666","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=8666"}],"version-history":[{"count":9,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8666\/revisions"}],"predecessor-version":[{"id":15018,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8666\/revisions\/15018"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=8666"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=8666"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=8666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}