The system should regularly check DNS names and sub-domain names in use by the application for expiration or change. This helps protect applications from the effects of sub-domain takeover attacks.
The primary purpose behind this verification is to protect the application from sub-domain takeover attacks. Sub-domain takeover attacks typically involve an attacker registering a domain that was previously used by a third-party service but is no longer active. If the sub-domain's DNS records are not properly updated or removed, an attacker can take control of the sub-domain and eventually launch attacks, such as phishing or serving malicious content under the assumed trust of the legitimate domain.
This requirement is verified in following services
Plan | Supported |
---|---|
Essential | 🔴 |
Advanced | 🟢 |