SECURITY PROFESSIONALS

Advanced DDI Security Solutions for IT Security Teams

Stronger infrastructure gives security teams the visibility and control to defend against threats.

Security professionals engineers

Reduce risk and strengthen your security with a powerful multi - faceted DDI layer for your defense-in-depth strategy

Disrupt the kill chain

Securing your DNS-DHCP-IPAM (DDI) infrastructure is not only prudent, as is securing all of your core infrastructure, but securing your DDI systems can also improve the overall security posture of your entire network. For example, consider the prevalent use of DNS in your network and how it may be used by an attacker under the common Lockheed Martin Cyber Kill Chain® model.

KILL CHAIN STEPDESCRIPTIONEXAMPLE USE OF DNS
ReconnaissanceResearch, identify vulnerabilities, and select attack targetDNS queries can identify attractive target hostname
WeaponizationBundle exploit with backdoor into deliverable payloadWeb page «src» links trigger DNS lookups
DeliveryDeliver weaponized bundleIf web-based, browser will looking linked URLs using DN
ExploitationExploit vulnerability to execute code on victim systemHTML email links invite DNS lookup
InstallationInstall malware on the victim systemDNS tunnel endpoint creation on the victim system
Command and ControlContact attacker site for instructions or software updateDNS is used over 90% of the time to contact attacker command and control sit
Attack actionInitiate attack action to manipulate, steal from, or otherwise disrupt victim systemData exfiltration over DNS (DNS tunneling)
KILL CHAIN STEPReconnaissance
DESCRIPTIONResearch, identify vulnerabilities, and select attack target
EXAMPLE USE OF DNSDNS queries can identify attractive target hostname
KILL CHAIN STEPWeaponization
DESCRIPTIONBundle exploit with backdoor into deliverable payload
EXAMPLE USE OF DNSWeb page «src» links trigger DNS lookups
KILL CHAIN STEPDelivery
DESCRIPTIONDeliver weaponized bundle
EXAMPLE USE OF DNSIf web-based, browser will looking linked URLs using DN
KILL CHAIN STEPExploitation
DESCRIPTIONExploit vulnerability to execute code on victim system
EXAMPLE USE OF DNSHTML email links invite DNS lookup
KILL CHAIN STEPInstallation
DESCRIPTIONInstall malware on the victim system
EXAMPLE USE OF DNSDNS tunnel endpoint creation on the victim system
KILL CHAIN STEPCommand and Control
DESCRIPTIONContact attacker site for instructions or software update
EXAMPLE USE OF DNSDNS is used over 90% of the time to contact attacker command and control sit
KILL CHAIN STEPAttack action
DESCRIPTIONInitiate attack action to manipulate, steal from, or otherwise disrupt victim system
EXAMPLE USE OF DNSData exfiltration over DNS (DNS tunneling)

Secure your DNS, protect your network

Attackers can use DNS in several ways to achieve their objectives throughout the kill chain. Unfortunately, you can’t just shut down DNS to eliminate the threat. DNS services are crucial to the simple navigation of the web by your users in translating www addresses into IP addresses. DNS is also indispensable for network administrators in enabling them to change their servers’ IP addresses and simply updating DNS to reflect the new name-to-address mapping.

Secure your DNS, protect your network

Protect sensitive data

Our DNS Firewall service protects your network from the inception of malware communications attempts. It enables you to block or redirect queries for known malware and other undesirable domains. This can prevent infected devices from obtaining software or attack instructions. Diamond IP provides a continually updated firewall feed for your recursive DNS servers to protect your network and to identify infected devices.

Protect sensitive data

Stop DNS tunneling

Diamond IP offers several key ingredients to your comprehensive network security strategy. Our products support protections against disruptive attacks, data exfiltration, malware proliferation, DNS cache poisoning, and much more.

Stop DNS tunneling

Comprehensive DDI security

Attackers may also attempt to use the DNS protocol itself to siphon sensitive information out of your organization. Sapphire DNS appliances support DNS tunneling detection with automated shutdown to reduce your risk of sensitive data exfiltration.

Comprehensive DDI security

DDI visibility and forensics

The Auditor monitors DHCP/DNS traffic as well as appliance status and load, including memory, processor, and input/output. This enables you to monitor and prevent potential capacity or outage conditions. The A30 appliance also supports reporting on IPControl administrator actions, consolidating your forensics data for streamlined analytics. Beyond providing critical network services visibility with the A30 Auditor appliance, Diamond IP can proactively help you improve overall network security.

DDI visibility and forensics

Actionable Intelligence

Attackers may attempt to redirect your users to imposter websites to harvest sensitive information. One means of redirection manipulates DNS responses to poison DNS cache. Users attempting to connect to popular websites could unwittingly connect to an attacker site. Authenticating DNS responses via DNSSEC provides one means of defense against this attack.

Actionable Intelligence

Reduce non-attack-based-risks-too

To protect your network you need visibility to monitor for and detect threats and active attacks. After you’ve identified, mitigated, and recovered from an attack, you need forensics data to enumerate the attack sequence and devise defenses to prevent future similar attacks. Our Sapphire A30 Auditor Appliance provides visibility and insights into your core IP network services.

Reduce non-attack-based-risks-too

Stop malware communications

As we’ve seen, malware operators exploit these and other DNS capabilities to locate command centers, to exfiltrate information, and to change or “flux” their IP addresses. This enables the malware to persist and nullify reactive IP address filtering should it be detected. This and other evasive techniques enable malware to persist within networks and stealthily execute attacks on behalf of the attacker.

Stop malware communications

Denial of services

Denial of service attacks threaten every network service and DNS is no exception. Sapphire appliances support anycast addressing to “spread out” DOS attacks across many servers. In addition, Sapphire appliances support inbound port rate limiting and as well as DNS response rate limiting to throttle packet traffic.

Denial of services

DDI Solutions for Security Professionals

Our experienced engineers will fine-tune the demo based on your specific needs. You’ll find out how easy it can be to secure your sensitive data.

DevOps engineers