Cygna Labs
Demo planen
shield

Strengthen your organization’s cybersecurity posture with software solutions from Cygna Labs

shield

Strengthen your cybersecurity defenses with DNS security solutions from Cygna Labs

DNS Security Resource Center

Cybersecurity continues to dominate the concerns and plans of information technology (IT) organizations at all levels from C-levels spanning all layers to network engineers. The impacts of a computing or network incident, whether instigated by an attacker or a natural disaster for example, can have broad impacts on an organization’s reputation, operations, customers, and financial position.

To help IT organizations protect and defend their networks against potential risks, the U.S. National Institute of Standards and Technologies (NIST) has published a cybersecurity framework which organizations may apply when assessing and defining their own cybersecurity plans. This NIST Cybersecurity Framework (CSF) is a de facto security implementation standard not only for the U.S. government, but for organizations worldwide. Given the foundational functions of DHCP, DNS and IPAM (DDI) supporting your network, applying these cybersecurity principles to your DDI infrastructure is imperative.

The CSF defines a common lexicon to facilitate documentation and communication of security requirements and level of current and targeted implementations. In addition, the framework enables an organization to identify risks and to prioritize the mitigation of risks with respect to business priorities and available resources. В The framework core defines security activities across five major functions: Identify, Protect, Detect, Respond, and Recover. A sixth major function, Govern, is planned for the forthcoming CSF 2.0 coming in 2024.

Cygna Labs DDI solutions

functiondescriptionDDI ImpactsCygna labs solutions
Govern
icon

Roles, responsibilities and policies

Roles, responsibilities and authorities are along with policies are enforced. Implementation and auditing of cybersecurity policy including specified roles and responsibilities, transaction audits and compliance reports.

Identify
icon

Asset inventory, risk assessment

Identifying configuration vulnerabilities and tracking and recording changes as well as IPv4/IPv6 address and DHCP/DNS server inventory spanning LAN, WAN, SDWAN, Cloud, IoT, remote workers/BYOD.

Protect
icon

Identity Management, Authentication, Access Control, Data and Platform Security

Role based access, ACLs, secure patched OS and software, data encryption (DoH/DoT), resilient deployments. Also record actions and get alerts for critical changes on cloud and on-prem Identity systems, OSes. Review access permissions and entitlements for principle of least privilege and separation of duties.

Detect
icon

Continuous monitoring and adverse event analysis

Monitor personnel and external service provider for malicious, suspicious, activities, or potential adverse events. Provide alerts to SOC, incident responders for key infrastructure services services on-prem or in the cloud.

Respond
icon

Incident analysis, response and mitigation

Determine what has happened during an incident and which resources that were compromised. Perform in depth analysis to find the root cause of incident to aid in subsequent detection and prevention.

Recover
icon

Incident recovery and communication

Recover deleted objects or rollback unwanted changes. Provide reports on recovery and rollback activities. Implement DDI components of recovery plan, e.g., IP subnets and VLANs, DHCP and DNS servers and configuration updates.

Cygna Security and ComplianceCygna Diamond IP IPControl softwareCygna VitalQIP softwareCygna Security and ComplianceCygna Auditor

Govern

icon
description

Roles, responsibilities and policies

DDI Impacts

Roles, responsibilities and authorities are along with policies are enforced. Implementation and auditing of cybersecurity policy including specified roles and responsibilities, transaction audits and compliance reports.

Identify

icon
description

Asset inventory, risk assessment

DDI Impacts

Identifying configuration vulnerabilities and tracking and recording changes as well as IPv4/IPv6 address and DHCP/DNS server inventory spanning LAN, WAN, SDWAN, Cloud, IoT, remote workers/BYOD.

Protect

icon
description

Identity Management, Authentication, Access Control, Data and Platform Security

DDI Impacts

Role based access, ACLs, secure patched OS and software, data encryption (DoH/DoT), resilient deployments. Also record actions and get alerts for critical changes on cloud and on-prem Identity systems, OSes. Review access permissions and entitlements for principle of least privilege and separation of duties.

Detect

icon
description

Continuous monitoring and adverse event analysis

DDI Impacts

Monitor personnel and external service provider for malicious, suspicious, activities, or potential adverse events. Provide alerts to SOC, incident responders for key infrastructure services services on-prem or in the cloud.

Respond

icon
description

Incident analysis, response and mitigation

DDI Impacts

Determine what has happened during an incident and which resources that were compromised. Perform in depth analysis to find the root cause of incident to aid in subsequent detection and prevention.

Recover

icon
description

Incident recovery and communication

DDI Impacts

Recover deleted objects or rollback unwanted changes. Provide reports on recovery and rollback activities. Implement DDI components of recovery plan, e.g., IP subnets and VLANs, DHCP and DNS servers and configuration updates.

Cygna Security and ComplianceCygna Diamond IP IPControl softwareCygna VitalQIP softwareCygna Security and ComplianceCygna Auditor
shield

Strengthen your cybersecurity defenses with DNS security solutions from Cygna Labs