Skip to content

SFC - DNS Registrar

The SEAL Framework Checklist (SFC) for DNS Registrar provides best practice for securely managing domain names and DNS configurations.

For more details on certifications or self-assessments, refer to the Certification Guidelines.

Section 1: Governance & Domain Management

0/3
Accountability for Domain Security
Is there a clearly designated person accountable for domain security? At minimum, accountability scope includes policy maintenance, security reviews, renewal management, access control oversight, and incident escalation.
Domain Inventory and Attributes
Do you maintain a comprehensive inventory of all domains, including ownership, purpose, criticality classification (e.g., based on whether external-facing and whether users may transact funds), and expiration dates?
Current Configuration Baselines for Domains
Do you document and maintain current configuration baselines for all domains? At minimum, baselines must include DNS record configurations, security settings (DNSSEC, CAA), and registrar account configurations.

Section 2: Risk Assessment & Classification

0/3
Formal Domain Classification System
Do you maintain a formal classification system for domains based on criticality, financial exposure, and operational impact?
Domain Configuration Compliance Verification
Do you verify that your domains comply with their documented configuration baselines and classification requirements? Do you conduct periodic reviews at least annually to ensure domain configurations match documented standards?
Enterprise Registrar Security Requirements
Do you use a domain registrar that supports enterprise security features? At minimum, the registrar must support registry locks and hardware security key MFA, and should not have a history of social engineering vulnerabilities.

Section 3: Access Control & Authentication

0/5
Registrar Access Management
Do you manage access to domain registrar accounts, with documented procedures? At minimum, procedures must cover who is authorized to access, how access is granted and revoked, and role-based permissions where available.
Multi-factor Authentication for Registrar Accounts
Do you enforce multi-factor authentication requirements for all registrar and DNS management accounts?
Dedicated Domain Security Contact Email
Do you use a dedicated security contact email for domain management that is hosted on a different domain than your primary domain? At minimum, the email must not be a personal email address, must be used exclusively for domain security purposes, and must be an alias that notifies multiple people.
Periodic Access Reviews for Domain Privileges
Do you conduct periodic access reviews for all personnel with domain management privileges? At minimum, access reviews must occur annually.
Change Management for Domain Operations
Do you have change management procedures for critical domain operations (transfers, deletions, nameserver changes) and DNS record modifications? At minimum, the relevant team members must be notified before critical changes, and all changes must be logged.

Section 4: Technical Security Controls

0/6
DNS Security Configuration Standards
Do you configure DNS security settings (DNSSEC, CAA records, TTL policies), with documented standards?
Email Authentication Protocol Standards
Do you configure email authentication (SPF, DKIM, DMARC, MTA-STS), with documented standards?
DMARC Monitoring and Response Procedures
Do you have procedures for monitoring and responding to DMARC reports and policy violations?
Domain Lock Implementation
Do you implement domain locks (transfer locks, registry locks, EPP status codes), with documented procedures?
Out of Band Domain Change Verification
Do you have procedures for out-of-band verification of domain changes through registrar support channels?
TLS Certificate Lifecycle Management Procedures
Do you have procedures for TLS certificate lifecycle management, including issuance, renewal, revocation, and using CAA records to restrict certificate issuance?

Section 5: Monitoring & Detection

0/5
Continuous Monitoring for DNS Changes
Do you monitor for unauthorized DNS record changes across all domains (whether through your registrar, third-party services, or your own tools)? At minimum, monitoring must cover nameserver changes, A/AAAA record changes, MX record changes, CAA record removal, and DNSSEC status changes.
DNS Compromise Indicators Monitoring
Do you monitor for specific indicators of DNS compromise (TTL changes, nameserver modifications, record anomalies), whether through your registrar, third-party services, or your own tools?
Automated Certificate Transparency Monitoring
Do you have automated monitoring for Certificate Transparency logs to detect unauthorized certificate issuance? At minimum, subscribe to a CT monitoring service that sends alerts when certificates are issued for your domains.
Domain Registration Status Monitoring
Do you monitor your own domain registration status and lock settings for unauthorized changes (whether through your registrar, third-party services, or your own tools)? At minimum, regularly verify that registry locks remain active and registrar account settings are unchanged.
Domain Expiration Risk Prevention
Do you monitor for and prevent domain expiration risks? At minimum, enable auto-renewal, set calendar reminders at 90/60/30/7 days before expiration, and ensure payment methods stay current.

Section 6: Incident Response

0/4
Domain Hijacking Incident Response
Do you have incident response procedures for domain hijacking and DNS compromise? At minimum, procedures must cover key scenarios (registrar account compromise, DNS hijacking, unauthorized transfers), pre-documented emergency contacts for registrar security team and SEAL 911, and communication plan for warning users.
Emergency Registry Lock Activation
Do you maintain procedures for emergency registry lock activation to prevent unauthorized domain changes?
Regaining Control of Compromised Domains
Do you have documented procedures for regaining control of compromised domains?
DNS Record Integrity Validation Procedures
Do you maintain procedures for validating DNS record integrity after incident recovery?