Appendix D: Best Practices Checklist
The master checklist organized by role. Use this as an audit tool for new setups and periodic reviews.
Appendix D: Best Practices Checklist
Organized by role. Use this as an audit tool when setting up a new domain or reviewing an existing infrastructure. Not every item applies to every situation — mark items N/A with a reason when they're genuinely not applicable.
Developer Checklist
DNS Behavior in Applications
- Application does not cache DNS resolutions indefinitely (respects TTL)
- HTTP client library is configured to re-resolve hostnames after TTL expiry
- No hardcoded IP addresses in application configuration that should be hostnames
- Application handles DNS failures gracefully (appropriate timeout + retry logic)
- Application logs DNS errors distinctly from connection errors
Container and Kubernetes DNS
-
ndotssetting reviewed for pod DNS config (default of 5 is usually too high for external queries) - External service URLs use FQDNs (trailing dot) or
ndots: 1is configured - CoreDNS metrics are being collected
- NXDOMAIN rate from CoreDNS is monitored and baselined
- Services using internal DNS discovery tested after DNS configuration changes
Email Authentication (For Domains You Send From)
- SPF record published at the sending domain
- SPF record covers all legitimate sending sources (transactional email, bulk email, internal mail servers)
- SPF record ends with
~allor-all(not+allor?all) - SPF record does not exceed 10 DNS lookup limit
- DKIM key published for each sending provider
- DKIM keys are at least 2048 bits
- DMARC record published at
_dmarc.domain.com - DMARC policy is
quarantineorreject(not justnone) - DMARC aggregate reports configured (
rua=) - DMARC reports are reviewed at least monthly
- PTR record exists for mail server sending IPs
DNS Records for New Deployments
- A/AAAA records created for all services
- Apex domain uses ALIAS/ANAME (not bare CNAME)
-
wwwsubdomain configured - No wildcard records created accidentally
- Deprecated subdomains removed when infrastructure is decommissioned
- DNS changes are part of deployment runbooks
Ops/SRE Checklist
Authoritative DNS Architecture
- Two or more DNS providers serve authoritative answers for primary domains
- Zone transfers configured and tested between primary and secondary
- SOA serial consistency verified between providers after each zone change
- Automated check runs to detect SOA serial drift between providers
- NS records at parent (registrar delegation) match NS records in zone
- Glue records published correctly for nameservers within the delegated zone
TTL Strategy
- TTLs documented for each record type and operational state
- Process exists for pre-lowering TTLs before planned changes
- No static records set to TTL > 86400s without documented reason
- After changes are confirmed, TTLs raised back to normal operational values
- TTL values reviewed annually as part of DNS audit
Registrar and Registry Security
- 2FA enabled on all registrar accounts
- Registrar accounts use shared/service email addresses (not individual personal email)
-
clientTransferProhibited(EPP transfer lock) enabled on all active domains - Registry lock (server-side lock) enabled on Tier 1 critical domains
- Auth codes documented in a secure password manager
- Auth codes verified as current (not expired) for critical domains
- Registrar account has minimum necessary user access
- No shared credentials for registrar accounts
DNSSEC
- DNSSEC status decision documented for each zone (enabled / not applicable / known risk accepted)
- If DNSSEC enabled: DS records published at parent registry
- If DNSSEC enabled: RRSIG expiry monitoring in place
- If DNSSEC enabled: key rollover schedule documented and tested
- If DNSSEC enabled: DNSSEC validation can be tested (
dig +dnssec)
Monitoring
- External DNS health checks running for primary domain A record
- External DNS health checks running for MX records
- NXDOMAIN rate alert configured on resolvers
- SERVFAIL rate alert configured
- Resolution latency P95 monitored
- SOA serial consistency check between providers automated
- Certificate Transparency monitoring configured for unexpected cert issuance
- Passive DNS monitoring for new domain registrations matching brand patterns
- Monitoring coverage verified from multiple geographic locations
Change Management
- DNS changes go through a documented review process
- DNS zone configuration stored in version control
- Drift detection runs periodically (IaC plan or equivalent)
- Runbooks include DNS change steps for all deployment types
- Post-change validation is documented and executed
Incident Response
- DNS incident runbook exists
- Team knows how to initiate emergency TTL lowering
- Contact information for DNS providers' emergency support is documented
- DNS failover to secondary provider has been tested (not just configured)
- Registry/registrar emergency contact procedures documented
Domain Manager Checklist
Portfolio Inventory
- Complete inventory of all registered domains maintained and current
- Each domain has a documented owner (person or team responsible)
- Each domain has a classification (active brand / active redirect / defensive / unknown)
- Expiry dates are tracked with 60-day advance reminders
- Registrant contact email addresses are active and monitored for all domains
Registration Strategy
- Tiered registration strategy documented (Tier 1, Tier 2, Tier 3)
- Strategy reviewed when entering new markets or launching new products
- New domain registrations include rationale in the portfolio record
- Renewal decisions are made actively, not by default auto-renewal
- "Unknown" classified domains are resolved (drop or reclassify) at next audit
Registrar Hygiene
- All critical domains consolidated at a registrar with API access
- Secondary registrar relationship exists for resilience
- Registrar has been evaluated against technical requirements (API, EPP status visibility, support quality)
- Registrar account contact information current
Security and Monitoring
- Passive DNS monitoring active for newly registered domains matching brand
- Monitoring covers known typosquat patterns
- Certificate Transparency monitoring for unexpected cert issuance on brand domains
- UDRP response process documented (who decides, who files, which provider)
- Key typosquat variants not in portfolio are monitored rather than registered
- High-risk typosquat variants (Tier 2) are owned and pointed to a redirect
Audit Process
- Annual domain portfolio audit scheduled and owned
- Audit covers: expiry status, technical health, classification review, renewal decisions
- Post-audit remediation backlog created and tracked
- Date of last audit documented
- Next audit date scheduled before closing current audit
New Domain Launch Checklist
When adding a new domain to production, work through this sequence:
- Domain registered at preferred registrar
- Transfer lock (EPP
clientTransferProhibited) enabled - Authoritative DNS set up at primary provider
- Zone configured with correct records
- Secondary DNS provider configured (zone transfer or independent configuration)
- SOA serial confirmed consistent between providers
- TTLs set to 300s during launch period
- SPF record published (if domain will send email)
- DKIM key published (if domain will send email)
- DMARC record published at
p=nonewith rua= (if domain will send email) - MX records configured (or Null MX
0 .if domain will never send or receive email) - CAA record restricting certificate issuance to intended CAs
- External DNS health checks configured
- Domain added to portfolio inventory
- DMARC policy escalation scheduled (review reports, move to
p=quarantinewithin 30 days)