NIST 800-53 REV 5 • SYSTEM AND COMMUNICATIONS PROTECTION

SC-21Secure Name/Address Resolution Service (Recursive or Caching Resolver)

Request and perform data origin authentication and data integrity verification on the name/address resolution responses the system receives from authoritative sources.

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

Supplemental Guidance

Each client of name resolution services either performs this validation on its own or has authenticated channels to trusted validation providers. Systems that provide name and address resolution services for local clients include recursive resolving or caching domain name system (DNS) servers. DNS client resolvers either perform validation of DNSSEC signatures, or clients use authenticated channels to recursive resolvers that perform such validations. Systems that use technologies other than the DNS to map between host and service names and network addresses provide some other means to enable clients to verify the authenticity and integrity of response data.

Practitioner Notes

Your recursive or caching DNS resolvers — the servers your users actually query — must validate DNS responses before caching them to prevent DNS poisoning attacks.

Example 1: Configure your internal DNS resolvers (Windows DNS, BIND) to validate DNSSEC signatures on responses from authoritative servers. Enable DNSSEC validation in Windows DNS via PowerShell: Set-DnsServerDsSetting -EnableDnsSec $true.

Example 2: Use Cloudflare (1.1.1.1) or Google (8.8.8.8) as forwarders for external DNS resolution — both perform DNSSEC validation. Configure your internal DNS to forward external queries to these resolvers over DNS-over-HTTPS for additional transport security.