DNS (Domain Name System) translates domain names into IP addresses. DNS security protects this process from manipulation, spoofing, and hijacking. Properly configured DNS records prevent email fraud, certificate mis-issuance, and subdomain takeover attacks. Our tests are based on NIST SP 800-81r3 recommendations and the relevant IETF standards for each protocol.
DS
DNSSEC
+15 / -15DNSSEC adds cryptographic signatures to DNS records. Resolvers verify signatures to ensure responses haven't been tampered with in transit. Without DNSSEC, attackers can forge DNS replies (cache poisoning) to redirect users to malicious servers. Enable it through your domain registrar and DNS provider.
Reference: RFC 4033, 4034, 4035 · NIST SP 800-81r3 §4
SPF
SPF Record
+15 / -15Sender Policy Framework (SPF) is a TXT record that lists which servers are allowed to send email for your domain. Receiving mail servers check this record to decide whether to accept, reject, or flag incoming mail. Use "-all" (hard fail) for strict enforcement or "~all" (soft fail) during rollout.
Reference: RFC 7208
DM
DMARC Record
+15 / -15DMARC builds on SPF and DKIM to tell receiving servers what to do with unauthorized emails (none, quarantine, or reject). It also enables aggregate reporting so you can monitor who is sending email from your domain. Start with p=none for monitoring, then move to p=quarantine or p=reject.
Reference: RFC 7489
CAA
CAA Records
+10 / -10Certificate Authority Authorization (CAA) records specify which CAs are allowed to issue TLS certificates for your domain. Without CAA records, any CA can issue a certificate, increasing the risk of unauthorized certificate issuance. Add records like: 0 issue "letsencrypt.org"
Reference: RFC 8659
NS
Nameserver Redundancy
+10 / -5Multiple nameservers across different providers protect against single points of failure. If one nameserver or provider experiences an outage, others continue serving DNS queries. Best practice is to have at least 2 nameservers from different networks or providers.
Reference: RFC 2182 · NIST SP 800-81r3 §5
SOA
SOA Configuration
+5 / -5The Start of Authority record defines zone-level settings including refresh intervals, retry timing, expiration, and negative caching TTL. Misconfigured SOA values can cause slow propagation, excessive queries, or stale records. Follow RFC 1912 recommended values for reliable zone transfers.
Reference: RFC 1035, RFC 1912
MX
MX Records
+10 / -10Mail Exchanger records direct email to your mail servers. Multiple MX records with different priorities provide failover if the primary server is unavailable. Domains that don't send or receive email should still set a null MX record to explicitly signal this.
Reference: RFC 5321, RFC 7505 (Null MX)
CN
Dangling CNAME
+10 / -25A dangling CNAME points to a hostname that no longer resolves. If the target was a cloud service (S3, Azure, Heroku), an attacker can claim it and serve content on your domain. This enables phishing, cookie theft, and reputation damage. Regularly audit CNAME records and remove any pointing to decommissioned services.
Reference: RFC 1034 §3.6 · Hardenize: Dangling DNS Detection
Scoring Methodology
The score starts at 100 and is adjusted by modifiers from each of the 8 DNS security tests. Positive modifiers reward good configuration; negative modifiers penalize missing or weak settings. The final score maps to a 13-grade scale from A+ to F. Test selection and weights are based on NIST SP 800-81r3 deployment recommendations and the relevant IETF RFCs for each protocol. Scoring approach inspired by internet.nl, the open-source internet standards compliance test suite.
| Test | Pass | Fail | Weight |
|---|
| DNSSEC | +15 | -15 | High |
| SPF Record | +15 | -15 | High |
| DMARC Record | +15 | -15 | High |
| CAA Records | +10 | -10 | Medium |
| MX Records | +10 | -10 | Medium |
| Nameserver Redundancy | +10 | -5 | Medium |
| SOA Configuration | +5 | -5 | Low |
| Dangling CNAME | +10 | -25 | Critical |