{"id":1062,"date":"2019-11-06T13:50:58","date_gmt":"2019-11-06T18:50:58","guid":{"rendered":"https:\/\/ndisac.org\/dev\/dibscc\/?p=1062"},"modified":"2025-05-16T13:24:35","modified_gmt":"2025-05-16T18:24:35","slug":"domain-name-server-mitigations","status":"publish","type":"post","link":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/domain-name-server-mitigations\/","title":{"rendered":"DNS Mitigations"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;4.0.6&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_text admin_label=&#8221;Add Description Here&#8221; _builder_version=&#8221;4.2.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;500&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_2_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_3_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_3_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_3_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_4_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_4_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_4_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_5_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_5_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_5_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_6_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_6_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_6_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221;]<\/p>\n<h3>What is DNS?<\/h3>\n<p>To access Internet resources by user-friendly domain names rather than IP addresses, users need a system that translates these domain names to IP addresses and back. This translation is the primary task of an engine called the Domain Name Server (DNS). <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-81-2.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">(Source)<\/a><\/p>\n<p>Attackers are using DNS to redirect traffic to malicious sites, steal data, and conduct attacks that can bring business to a standstill.<br \/>\n[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243;]\n\t\t\t<div class='et-tabs-container et_sliderfx_fade et_sliderauto_false et_sliderauto_speed_5000 et_slidertype_top_tabs'>\n\t\t\t\t<p>\n\t\t<ul class='et-tabs-control'>\n\t\t\t<li><a href='#'>\n\t\t\tStandards\n\t\t<\/a><\/li>\n\n\t\t<li><a href='#'>\n\t\t\tImplementation \/ Use Cases\n\t\t<\/a><\/li>\n\n\t\t<li><a href='#'>\n\t\t\tIndustry Best Practices\n\t\t<\/a><\/li>\n\n\t\t<li><a href='#'>\n\t\t\tExample Tools \/ Policies\n\t\t<\/a><\/li>\n\n\t\t<li><a href='#'>\n\t\t\tCMMC Readiness\n\t\t<\/a><\/li>\n\t\t<\/ul> <!-- .et-tabs-control -->\n\n\t\t<div class='et-tabs-content'>\n\t\t\t<div class='et-tabs-content-main-wrap'>\n\t\t\t\t<div class='et-tabs-content-wrapper'>\n\t\t\t\t\t<div class='et_slidecontent'>\n\t\t\t<p class=\"p1\"><span class=\"s1\"><!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat611 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/csrc.nist.gov\/projects\/cprt\/catalog#\/cprt\/framework\/version\/SP_800_53_5_1_1\/home?element=SC-20\" id=\"link-14622\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">NIST SP 800-53 Rev 5: SC-20 Secure Name\/Address Resolution Service (Authoritative Source)<\/a>\n<p>NIST resource that defines the requirements for Secure Name\/Address Resolution Service (Authoritative Source).<\/p><\/li>\n<li><a href=\"https:\/\/csrc.nist.gov\/projects\/cprt\/catalog#\/cprt\/framework\/version\/SP_800_53_5_1_1\/home?element=SC-21\" id=\"link-14623\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">NIST SP 800-53 Rev 5: SC-21 Secure Name\/Address Resolution Service (Recursive or Caching Resolver)<\/a>\n<p>NIST resource that defines the requirements for Secure Name\/Address Resolution Service (Recursive or Caching Resolver).<\/p><\/li>\n<li><a href=\"https:\/\/csrc.nist.gov\/projects\/cprt\/catalog#\/cprt\/framework\/version\/SP_800_53_5_1_1\/home?element=SC-22\" id=\"link-14624\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">NIST SP 800-53 Rev 5: SC-22 Architecture and Provisioning for Name\/Address Resolution Service<\/a>\n<p>NIST resource that defines the requirements for Architecture and Provisioning for Name\/Address Resolution Service.<\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'b6c3152607',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\t\t<\/div>\n\n\t\t<div class='et_slidecontent'>\n\t\t\t<p class=\"p1\"><span class=\"s1\"><!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat612 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/www.cloudflare.com\/learning\/access-management\/what-is-dns-filtering\/\" id=\"link-6083\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Cloudflare \u2013 What is DNS Filtering?<\/a>\n<p>This article from Cloudflare gives a high level overview of DNS filtering.<\/p><\/li>\n<li><a href=\"https:\/\/cybersecuritynews.com\/dns-attacks\/\" id=\"link-10443\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Cyber Security News &#8211; Top 10 Dangerous DNS Attacks Types and The Prevention Measures<\/a>\n<p>Top ten dangerous DNS attack types and how to mitigate them<\/p><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=GtO53oqcM7Q&#038;list=PL-BF3N9rHBLJaSbTRPyWYj56f0m2uDQD7&#038;index=4\" id=\"link-3363\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Cybersecurity and Infrastructure Security Agency &#8211; Strengthen Your Resolve \u2013 Understanding DNS Attacks<\/a>\n<p>This YouTube video from CISA applies managers and business leaders and provides an organizational perspective and topic overview that may be useful to technical specialists.<\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'b6c3152607',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\t\t<\/div>\n\n\t\t<div class='et_slidecontent'>\n\t\t\t<p class=\"p1\"><span class=\"s1\"><!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat613 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/www.akamai.com\/glossary\/what-is-a-dns-ddos-attack\" id=\"link-10767\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Akamai &#8211; What Is a DNS DDoS Attack?<\/a>\n<p>This article from Akamai discusses how DNS and DNS attacks work.<\/p><\/li>\n<li><a href=\"https:\/\/docs.aws.amazon.com\/Route53\/latest\/DeveloperGuide\/domain-configure-dnssec.html\" id=\"link-10441\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Amazon Web Services &#8211; Configuring DNSSEC for a domain<\/a>\n<p>This guide provides information on how to protect your Amazon AWS domain by configuring DNSSEC protocol.<\/p><\/li>\n<li><a href=\"https:\/\/docs.netscaler.com\/en-us\/citrix-adc\/current-release\/dns\/mitigating-dns-ddos-attacks.html\" id=\"link-10768\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Citrix &#8211; Mitigate DNS DDoS attacks<\/a>\n<p>This article from Citrix discusses how to flush negative records, restrict the time to live (TTL) of negative records, preserve Citrix ADC memory by limiting the memory consumed by the DNS cache, retain DNS records in the cache, and enable DNS cache bypass.<\/p><\/li>\n<li><a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/dns-security-appliances-in-azure\/\" id=\"link-6086\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Microsoft \u2013 DNS Security Appliances in Azure<\/a>\n<p>This article from Microsoft gives an overview of some ways of protecting your DNS using security appliances in Azure.<\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'b6c3152607',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\t\t<\/div>\n\n\t\t<div class='et_slidecontent'>\n\t\t\t<p class=\"p1\"><span class=\"s1\"><!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat614 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/securitydocs.cisco.com\/docs\/umbrella-sig\/olh\/151215.dita\" id=\"link-14696\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Cisco Umbrella &#8211; Best Practices for DNS Policies<\/a>\n<p>This link provides best practices for creating DNS policies using Cisco Umbrella.<\/p><\/li>\n<li><a href=\"https:\/\/developers.cloudflare.com\/cloudflare-one\/traffic-policies\/dns-policies\/common-policies\/\" id=\"link-14691\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Cloudflare Docs &#8211; Common policies for DNS traffic<\/a>\n<p>This website provides policies that are commonly used to secure DNS traffic.<\/p><\/li>\n<li><a href=\"https:\/\/www.nsa.gov\/About\/Cybersecurity-Collaboration-Center\/DIB-Cybersecurity-Services\/\" id=\"link-14731\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">NSA CCC Protective Doman Name Service (PDNS+)<\/a>\n<p>Combines commercial cyber threat feeds with the NSA\u2019s unique insights to filter external DNS queries and block known malicious or suspicious website traffic, mitigating nation-state malware, spear phishing, botnets, and more.<\/p><\/li>\n<li><a href=\"http:\/\/www.squid-cache.org\/\" id=\"link-9609\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Squid Cache<\/a>\n<p>Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response times by caching and reusing frequently-requested web pages. Squid has extensive access controls and makes a great server accelerator. It runs on most available operating systems, including Windows and is licensed under the GNU GPL.<\/p><\/li>\n<li><a href=\"https:\/\/technology.berkeley.edu\/domain-name-system-dns-service-policy-and-resources\" id=\"link-14693\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">University of California Berkeley &#8211; DNS Policy and Resources<\/a>\n<p>This link provides a sample Domain Name System (DNS) Service Policy and Resources.<\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'b6c3152607',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\t\t<\/div>\n\n\t\t<div class='et_slidecontent'>\n\t\t\tCMMC Related Controls<\/p>\n<ul>\n<li>Level 2 | <a href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/ac-l2-3-1-3\/\">AC.L2-3.1.3 \u2013 Control CUI Flow: Control the flow of CUI in accordance with approved authorizations.<\/a><\/li>\n<li>Level 2 | <a href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/level-2\/si-l2-3-14-6\/\">SI.L2-3.14.6 \u2013 Monitor Communications for Attacks: Monitor organizational systems, including inbound and outbound communications traffic, to detect attacks and indicators of potential attacks.<\/a><\/li>\n<\/ul>\n<p>CMMC Assessment Guides<\/p>\n<p class=\"p1\"><span class=\"s1\"><!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat671 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/AssessmentGuideL1v2.pdf\" id=\"link-9988\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">CMMC Level 1 Self-Assessment Guide<\/a>\n<p>This document provides self-assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 1.<\/p>\n<\/li>\n<li><a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/AssessmentGuideL2v2.pdf\" id=\"link-9989\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">CMMC Level 2 Assessment Guide<\/a>\n<p>This document provides assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 2.<\/p>\n<\/li>\n<li><a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/CMMC\/AssessmentGuideL3v2.pdf\" id=\"link-14791\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">CMMC Level 3 Assessment Guide<\/a>\n<p>This document provides assessment guidance for conducting Cybersecurity Maturity Model Certification (CMMC) assessments for Level 3.<\/p>\n<\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'b6c3152607',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\n<\/span><\/p>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t<\/div> <!-- .et-tabs-container -->[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;4.0.6&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_text admin_label=&#8221;Add Description Here&#8221; _builder_version=&#8221;4.2.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;500&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":1866,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam id tincidunt sapien. Suspendisse aliquam nisl sapien, luctus sodales tellus vehicula non. Interdum et malesuada fames ac ante ipsum primis in faucibus. Etiam facilisis pellentesque sapien, vel porta nibh commodo at. Aliquam eu porta nisi, eget tincidunt quam. Nam eu nunc convallis, gravida magna rhoncus, tincidunt quam. Praesent quis gravida magna, non lacinia orci. Vivamus et scelerisque odio, in fringilla massa. Integer nec ipsum nibh. Mauris tincidunt dictum nulla, id tristique massa dictum ac. Curabitur porttitor nisl sit amet ornare aliquet. Sed sed ultrices nibh, id varius felis. Nunc cursus lobortis ex feugiat aliquam.<\/p><p>Nullam justo dui, imperdiet luctus enim euismod, consequat euismod sapien. Aenean placerat fermentum magna, id tempus libero consectetur nec. Morbi a nunc orci. Donec porta, tellus vitae bibendum pulvinar, diam sapien mattis nisi, vitae lobortis quam sem non purus. Cras tempus odio eget urna faucibus sollicitudin. Aliquam porta neque in arcu vehicula venenatis eu vitae nulla. Vivamus sed neque ligula. Maecenas auctor dui et arcu pellentesque molestie.<\/p><p>Fusce luctus diam sit amet nisl consequat, vitae aliquam metus finibus. Nulla facilisi. In nec neque sem. Ut vitae fermentum mauris, vel gravida turpis. Nunc vitae velit sit amet ipsum semper condimentum sed id metus. Phasellus vel mauris dignissim, lobortis felis ac, eleifend justo. Suspendisse consectetur erat eu ipsum euismod ultricies. Vestibulum a libero quis nibh congue sagittis eget sed ipsum. Morbi dictum mi id sem imperdiet, ac pretium lorem suscipit.<\/p>","_et_gb_content_width":"","footnotes":""},"categories":[24],"tags":[],"class_list":["post-1062","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-top-10-high-value-controls"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DNS Mitigations - DIB SCC CyberAssist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/domain-name-server-mitigations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS Mitigations - DIB SCC CyberAssist\" \/>\n<meta property=\"og:description\" content=\"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;4.0.6&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_text admin_label=&#8221;Add Description Here&#8221; _builder_version=&#8221;4.2.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;500&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/domain-name-server-mitigations\/\" \/>\n<meta property=\"og:site_name\" content=\"DIB SCC CyberAssist\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-06T18:50:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-16T18:24:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"660\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"markcarr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"markcarr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/domain-name-server-mitigations\/\",\"url\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/domain-name-server-mitigations\/\",\"name\":\"DNS Mitigations - DIB SCC CyberAssist\",\"isPartOf\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/domain-name-server-mitigations\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/domain-name-server-mitigations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059.jpg\",\"datePublished\":\"2019-11-06T18:50:58+00:00\",\"dateModified\":\"2025-05-16T18:24:35+00:00\",\"author\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0\"},\"breadcrumb\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/domain-name-server-mitigations\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/domain-name-server-mitigations\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/domain-name-server-mitigations\/#primaryimage\",\"url\":\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059.jpg\",\"contentUrl\":\"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059.jpg\",\"width\":1000,\"height\":660,\"caption\":\"DNS concept isolated on white background\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/domain-name-server-mitigations\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ndisac.org\/dibscc\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DNS Mitigations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\",\"url\":\"https:\/\/ndisac.org\/dibscc\/\",\"name\":\"DIB SCC CyberAssist\",\"description\":\"Cybersecurity Resources for DIB companies and suppliers\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0\",\"name\":\"markcarr\",\"url\":\"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DNS Mitigations - DIB SCC CyberAssist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/domain-name-server-mitigations\/","og_locale":"en_US","og_type":"article","og_title":"DNS Mitigations - DIB SCC CyberAssist","og_description":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;4.0.6&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_text admin_label=&#8221;Add Description Here&#8221; _builder_version=&#8221;4.2.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;500&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]","og_url":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/domain-name-server-mitigations\/","og_site_name":"DIB SCC CyberAssist","article_published_time":"2019-11-06T18:50:58+00:00","article_modified_time":"2025-05-16T18:24:35+00:00","og_image":[{"width":1000,"height":660,"url":"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059.jpg","type":"image\/jpeg"}],"author":"markcarr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"markcarr","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/domain-name-server-mitigations\/","url":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/domain-name-server-mitigations\/","name":"DNS Mitigations - DIB SCC CyberAssist","isPartOf":{"@id":"https:\/\/ndisac.org\/dibscc\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/domain-name-server-mitigations\/#primaryimage"},"image":{"@id":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/domain-name-server-mitigations\/#primaryimage"},"thumbnailUrl":"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059.jpg","datePublished":"2019-11-06T18:50:58+00:00","dateModified":"2025-05-16T18:24:35+00:00","author":{"@id":"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0"},"breadcrumb":{"@id":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/domain-name-server-mitigations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/domain-name-server-mitigations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/domain-name-server-mitigations\/#primaryimage","url":"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059.jpg","contentUrl":"https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059.jpg","width":1000,"height":660,"caption":"DNS concept isolated on white background"},{"@type":"BreadcrumbList","@id":"https:\/\/ndisac.org\/dibscc\/implementation-and-assessment\/top-10-high-value-controls\/domain-name-server-mitigations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ndisac.org\/dibscc\/"},{"@type":"ListItem","position":2,"name":"DNS Mitigations"}]},{"@type":"WebSite","@id":"https:\/\/ndisac.org\/dibscc\/#website","url":"https:\/\/ndisac.org\/dibscc\/","name":"DIB SCC CyberAssist","description":"Cybersecurity Resources for DIB companies and suppliers","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ndisac.org\/dibscc\/#\/schema\/person\/930af72cb910c130c27675e47ba8e9a0","name":"markcarr","url":"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/"}]}},"rttpg_featured_image_url":{"full":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059.jpg",1000,660,false],"landscape":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059.jpg",1000,660,false],"portraits":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059.jpg",1000,660,false],"thumbnail":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059-150x150.jpg",150,150,true],"medium":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059-300x198.jpg",300,198,true],"large":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059.jpg",1000,660,false],"1536x1536":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059.jpg",1000,660,false],"2048x2048":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059.jpg",1000,660,false],"et-pb-post-main-image":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059-400x250.jpg",400,250,true],"et-pb-post-main-image-fullwidth":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059.jpg",1000,660,false],"et-pb-portfolio-image":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059-400x284.jpg",400,284,true],"et-pb-portfolio-module-image":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059-510x382.jpg",510,382,true],"et-pb-portfolio-image-single":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059.jpg",1000,660,false],"et-pb-gallery-module-image-portrait":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059-400x516.jpg",400,516,true],"et-pb-post-main-image-fullwidth-large":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059.jpg",1000,660,false],"et-pb-image--responsive--desktop":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059.jpg",1000,660,false],"et-pb-image--responsive--tablet":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059-980x647.jpg",835,551,true],"et-pb-image--responsive--phone":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059-480x317.jpg",409,270,true],"gform-image-choice-sm":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059.jpg",300,198,false],"gform-image-choice-md":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059.jpg",400,264,false],"gform-image-choice-lg":["https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/11\/73464289-1059.jpg",600,396,false]},"rttpg_author":{"display_name":"markcarr","author_link":"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/"},"rttpg_comment":0,"rttpg_category":" <a href=\"https:\/\/ndisac.org\/dibscc\/category\/implementation-and-assessment\/top-10-high-value-controls\/\" rel=\"tag\">Top 10 High Value Controls<\/a>","rttpg_excerpt":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;4.0.6&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.0.6&#8243;][et_pb_text admin_label=&#8221;Add Description Here&#8221; _builder_version=&#8221;4.2.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;500&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]","_links":{"self":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts\/1062"}],"collection":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/comments?post=1062"}],"version-history":[{"count":11,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts\/1062\/revisions"}],"predecessor-version":[{"id":16313,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/posts\/1062\/revisions\/16313"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/media\/1866"}],"wp:attachment":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/media?parent=1062"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/categories?post=1062"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tags?post=1062"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}