As most accounts in the domain name system are privileged or system level accounts, account management and distribution is vital to the security of the DNS implementation and infrastructure. If an attacker compromises an account, the entire DNS infrastructure, not to mention the hosts on the network, is at risk. Authentication for user, administrative, or system access to the system is required at all times.
Accounts are utilized for identifying individual application users or for identifying the application processes themselves. When DNS accounts are terminated, user accessibility may be affected.
In order to detect and respond to events affecting user accessibility and DNS service processing, the system must audit account modification actions and, as required, notify the appropriate individuals, so they can investigate the event to ensure its validity.
Such a capability greatly reduces the risk that DNS accessibility will be negatively affected for extended periods of time and provides logging that can be used for forensic purposes. |