The primary objective of DNS authentication and access control is the integrity of DNS records; only authorized personnel must be able create and modify resource records, and name servers should only accept updates from authoritative master servers for the relevant zones. Integrity is best assured through authentication and access control features within the name server software, though firewalls also play a significant role in controlling DNS transactions on a network. In order to protect the zone files themselves, which should only be accessed by the name service or an administrator, access controls need to be implemented on files.
In DNS there are numerous access control policies (e.g., identity-based policies, role-based policies, attribute-based policies) and access enforcement mechanisms (e.g., access control lists, access control matrices, cryptography) that are employed to control access between users (or processes acting on behalf of users) and objects (e.g., devices, files, records, processes, programs, domains). Access controls provide protection to the data and resources of the DNS. If an adversary is able to obtain or change a zone file, the DNS infrastructure is potentially at risk of failure or denial of service.
DNS must enforce these non-discretionary access control policies over the DNS database or zone files to ensure data protection and integrity of the zone data. |