CIS Safeguard 4.9: Configure Trusted DNS Servers on Enterprise Assets

CIS Safeguard 4.9: Configure Trusted DNS Servers on Enterprise Assets

By Steve Gold
Posted in Security
On July 15, 2025

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation

The Matrix and the Power of Choosing the Right Reality

In the 1999 sci-fi classic The Matrix, Neo is offered a choice: take the red pill and see the truth, or take the blue pill and remain in a fabricated illusion. This iconic moment is more than just cinematic gold, it’s a perfect metaphor for CIS Safeguard 4.9, which urges organizations to configure trusted DNS servers on all enterprise assets.

Just like Neo’s choice determined whether he saw the real world or a manipulated one, your choice of DNS servers determines whether your systems access legitimate internet destinations or fall prey to malicious redirections.

What Is CIS Safeguard 4.9?

CIS Safeguard 4.9 is part of the Center for Internet Security (CIS) Critical Security Controls, specifically under Control 4: Secure Configuration of Enterprise Assets and Software. This safeguard recommends:

Configure trusted DNS servers on enterprise assets to ensure DNS queries are resolved by known, secure, and monitored servers.”

Why It Matters

DNS (Domain Name System) is like the phonebook of the internet. When you type a website address, DNS translates it into an IP address so your device can connect to the correct server.

But here’s the catch: if your DNS server is compromised or untrusted, it can redirect you to malicious sites, even if you typed the correct URL. This is known as DNS spoofing or DNS hijacking.

Real-World Risks:

  • Phishing attacks that look like legitimate websites
  • Malware downloads from spoofed domains
  • Data interception and surveillance

How to Implement Safeguard 4.9

Here’s how to take the “red pill” and secure your DNS reality:

  1. Use Trusted DNS Providers
    Choose DNS services known for security and privacy, such as:
    • Google Public DNS (8.8.8.8, 8.8.4.4)
    • Cloudflare DNS (1.1.1.1)
    • Quad9 (9.9.9.9)
  2. Configure DNS Settings on All Devices
    Apply DNS settings via:
    • Group Policy (for Windows environments)
    • DHCP server configurations
    • Endpoint management tools
  3. Enable DNSSEC (DNS Security Extensions)
    This adds cryptographic signatures to DNS data, ensuring authenticity.
  4. Monitor DNS Traffic
    Use DNS logging and monitoring tools to detect anomalies or unauthorized changes.
  5. Block Untrusted DNS Requests
    Prevent devices from using rogue DNS servers by enforcing firewall rules.

Final Thoughts: Choose the Right Reality

In The Matrix, Neo’s journey begins with a simple choice. In cybersecurity, configuring trusted DNS servers is one of those deceptively simple but powerful decisions. It’s a foundational step that protects your organization from a wide range of threats.

So ask yourself: are your systems seeing the real internet—or a dangerous illusion?

"

Resources

Here’s a link to the Secure Configuration Management for CIS Control 4, 9, and 12 provided free of charge from the fine folks at the Center for Internet Security:

Looking for even more detail? Here you go. If this still doesn’t satisfy your curiosity, DM me.

CIS Control 4 – Secure Configuration of Enterprise Assets and Software

Develop processes and technical controls to identify, classify, securely handle, retain, and dispose of data.

CIS Safeguard 4.9: - Configure Trusted DNS Servers on Enterprise Assets

Configure trusted DNS servers on network infrastructure. Example implementations include configuring network devices to use enterprise-controlled DNS servers and/or reputable externally accessible DNS servers.

Steve Gold

Steve Gold

Steve Gold is the Cybersecurity Practice Director at Gotham Technology Group (Gotham). He is responsible for providing the vision and thought leadership to expand Gotham’s legacy of success and build a world-class cybersecurity practice. He works closely with Gotham’s customers, industry partners, and subject matter experts to develop relevant solutions for Gotham’s clients and prospects.

Prior to joining Gotham, Steve worked with the Center for Internet Security (CIS), where he expanded the global reach, revenue, and impact of the CIS Benchmarks, CIS Controls, and CIS Hardened Images. He led the efforts to promote the CIS portfolio of low-cost and no-cost cybersecurity products and services that help private and public organizations stay secure in the connected world. He grew a team of security specialists from 12 to over 40 to assist organizations with implementing security best practices in their continual journey of cybersecurity maturity.

During his more than 20-year career, Steve led teams responsible for developing and implementing technology solutions at some of the industry’s most recognized companies such as Varonis, VMware, Dell & Wyse Technology

Steve is a frequent speaker/moderator at industry conferences and webinars, covering a wide array of information security topics. He resides and works remotely in Baltimore, MD.