Managed DNS

Best practices

  • Create an IAM group, add users to the group, and grant the required permissions on the Google Cloud DNS service for the target group.

  • Enable DNSSEC signing on any public-hosted zone to protect against DNS spoofing attacks.

  • Remove unassigned DNS records from your hosted zones (records of resources such as IP addresses that connected to a resource that was removed).

  • Use Google Cloud DNS private zones to manage DNS records for internal resources (such as resources located inside private subnets).

  • Enable Google Cloud DNS audit logs to monitor DNS activity.

  • Note that admin activity audit logs are enabled by default and cannot be disabled.

  • Explicitly enable data access audit logs to log activities in Google Cloud DNS.

  • Limit access to audit logs to the minimum number of employees to avoid unwanted changes to the audit logs.