More Info:

Ensure that Subdomain NS delegations are not vulnerable.

Risk Level

High

Address

Security

Compliance Standards

SOC2, NISTCSF

Triage and Remediation

Remediation

To remediate the GCP Subdomain NS Delegations Vulnerable misconfiguration in GCP DNS using the GCP console, follow these steps:

  1. Open the Google Cloud Console (https://console.cloud.google.com) and log in to your GCP account.

  2. Navigate to the “Cloud DNS” page by clicking on the navigation menu and selecting “Networking” > “Cloud DNS”.

  3. On the Cloud DNS page, you will see a list of your DNS zones. Select the zone that contains the subdomain with the NS delegation vulnerability.

  4. In the zone details, you will see a list of DNS records. Look for the NS (Name Server) records related to the vulnerable subdomain. These records specify the authoritative name servers for the subdomain.

  5. Click on the checkbox next to each NS record related to the vulnerable subdomain to select them.

  6. Once the NS records are selected, click on the “Delete” button at the top of the page to remove them.

  7. A confirmation dialog will appear. Review the selected records and click on the “Delete” button to confirm the deletion.

  8. After deleting the NS records, the subdomain will no longer have any NS delegation. The DNS resolution for the subdomain will now be handled by the parent domain’s name servers.

  9. Verify the changes by performing a DNS lookup for the subdomain using a tool like “dig” or “nslookup”. Ensure that the NS records for the subdomain no longer exist.

By following these steps, you will be able to remediate the GCP Subdomain NS Delegations Vulnerable misconfiguration in GCP DNS using the GCP console.