Strengthen your cybersecurity defenses with DNS security solutions from Cygna Labs
Learn more by viewing our recent Secure for '24 webinar

Learn more by viewing our recent Secure for '24 webinar
DNS Security Resource Center
Cybersecurity continues to dominate the concerns and plans of information technology (IT) organizations at all levels from C-levels spanning all layers to network engineers. The impacts of a computing or network incident, whether instigated by an attacker or a natural disaster for example, can have broad impacts on an organization’s reputation, operations, customers, and financial position.

To help IT organizations protect and defend their networks against potential risks, the U.S. National Institute of Standards and Technologies (NIST) has published a cybersecurity framework which organizations may apply when assessing and defining their own cybersecurity plans. This NIST Cybersecurity Framework (CSF) is a de facto security implementation standard not only for the U.S. government, but for organizations worldwide. Given the foundational functions of DHCP, DNS and IPAM (DDI) supporting your network, applying these cybersecurity principles to your DDI infrastructure is imperative.
The CSF defines a common lexicon to facilitate documentation and communication of security requirements and level of current and targeted implementations. In addition, the framework enables an organization to identify risks and to prioritize the mitigation of risks with respect to business priorities and available resources. В The framework core defines security activities across five major functions: Identify, Protect, Detect, Respond, and Recover. A sixth major function, Govern, is planned for the forthcoming CSF 2.0 coming in 2024.
Cygna Labs DDI solutions
function | description | DDI Impacts | Cygna labs solutions |
---|---|---|---|
Identify | Asset inventory, risk assessment | IPv4/IPv6 address and DHCP/DNS server inventory spanning LAN, WAN, SDWAN, Cloud, IoT, remote workers/BYOD | |
Protect | Identity and access control, data and platform security | Role based access, ACLs, secure patched OS and software, data encryption (DoH/DoT), resilient deployments | |
Detect | Continuous monitoring and event correlation | Continuous monitoring of DDI transactions, anomaly detection, malware activity, exfiltration attempts | |
Respond | Incident analysis, response, and mitigation | Cyberthreat investigation for incident analysis, response and mitigation | |
Recover | Incident recovery and feedback | Implement DDI components of recovery plan, e.g., IP subnets and VLANs, DHCP and DNS servers and configuration updates | |
Govern | Policies, procedures, compliance | Transactional audits and compliance reports |
Identify
Asset inventory, risk assessment
IPv4/IPv6 address and DHCP/DNS server inventory spanning LAN, WAN, SDWAN, Cloud, IoT, remote workers/BYOD
Protect
Identity and access control, data and platform security
Role based access, ACLs, secure patched OS and software, data encryption (DoH/DoT), resilient deployments
Detect
Continuous monitoring and event correlation
Continuous monitoring of DDI transactions, anomaly detection, malware activity, exfiltration attempts
Respond
Incident analysis, response, and mitigation
Cyberthreat investigation for incident analysis, response and mitigation
Recover
Incident recovery and feedback
Implement DDI components of recovery plan, e.g., IP subnets and VLANs, DHCP and DNS servers and configuration updates
Govern
Policies, procedures, compliance
Transactional audits and compliance reports