17.11.2025 • Topstories

When the Internet stumbles: Why DNS is important

Last week's massive AWS outage was a reminder that the modern Internet - an ecosystem of billions of connections, services and devices - still depends on a handful of silent, foundational systems. At the top of that list is the Domain Name System (DNS), the essential layer that translates human-readable names into machine-readable addresses. If DNS falters, everything that is built on it will also fail.

Robert Frank, Area Vice President Central Europe at DigiCert

When the AWS US-East-1 region went down, many organizations not only couldn't process requests, they couldn't even report their outages. Without working DNS resolution, systems couldn't find their monitoring or incident reporting endpoints. The event underscored a truth that security experts already know: DNS is not optional "plumbing"; it's the connective tissue of modern cloud-based applications.

A brief introduction: How DNS works

Photo
Robert Frank, Area Vice President Central Europe at DigiCert
© DigiCert Inc.

Every digital interaction, from sending an email to launching an app, starts with a DNS lookup. When you type PetStore.com into your browser, your device sends a request to translate that domain name into the appropriate IP address so it knows which server to contact. This process involves two different but complementary systems: recursive DNS and authoritative DNS.

Recursive DNS servers act on behalf of the user. They receive the original request, check cached results and, if necessary, contact other DNS servers, such as an upstream recursive server or authoritative servers, to find the correct IP address. These resolvers are typically operated by a local network administrator, internet service providers (ISPs), cloud platforms or specialized DNS providers. Recursive DNS is what most people interact with - indirectly - every time they go online.

Authoritative DNS, on the other hand, provides the definitive answer for a zone or domain in a tree hierarchy below the "root" servers and top-level domains such as .com, .org or .de. These servers are maintained by domain owners or DNS providers and contain the official records - A, AAAA, MX, TXT, CNAME - that define where traffic should be directed. When a user asks a recursive resolver, "Where is PetStore.com?", the recursive server queries the hierarchy of authoritative DNS servers, which provide an answer for the part of the tree for which they are authoritative (responsible).

Both are critical, but they fulfill very different roles. The AWS incident showed what happens when one side - the recursive layer - fails.

What went wrong at AWS

The AWS outage was primarily a problem within the company's internal control plane and recursive resolver infrastructure. When the recursive DNS layer went offline, applications and devices lost the ability to translate names to addresses, even though the authoritative resource records for those domains were still intact and reachable from other recursive servers.

This distinction is key: the authoritative DNS remained intact, but recursive failures prevented end users from ever reaching it. Imagine all the street signs in a city are still there, but no one can read them. The map exists; it's the navigation that fails.

When recursive DNS fails, systems that rely on hostname resolution can't resolve their monitoring and alerting systems to signal the problem. This is why outages often appear worse than they are - the feedback loops themselves are broken.

The evolution of DNA resilience

Historically, DNS was designed for simplicity, not redundancy. Early networks were based on small numbers of users and a stable infrastructure. As dependency grew, redundancy strategies evolved - secondary name servers, anycast routing, geographically distributed hosting and now multi-provider DNS configurations.

Authoritative DNS redundancy ensures that if one data center or provider is unavailable, another can respond to requests from elsewhere in the world. Recursive DNS redundancy, meanwhile, ensures that users have multiple resolvers to query so that the failure of one provider does not block every lookup.

Today's DNS-dependent world requires both. Organizations that only protect one layer are putting themselves at risk. This week's incident reinforced that point: Even a flawless authoritative DNS won't help if users can't resolve queries through the recursive layer.

Why DNS is the basis for digital trust

DNS doesn't just make the internet usable; it makes it trustworthy. It ensures that users reach the legitimate version of a service and not an impostor. That's why features like DNSSEC exist - to validate that DNS responses have not been tampered with by a recursive server or the network it resides on.

DNS also underpins other critical layers of digital trust, including TLS certificates, email authentication (DMARC, DKIM, SPF) and zero trust network access. A single DNS misconfiguration or availability issue can lead to a cascade of certificate validation failures, email delivery failures or interrupted application routing.

In short, DNS is not just an address system; it is an identity system and a distributed database.

Develop a strong DNS strategy

So what can organizations do to strengthen their DNA foundation? Here are some key considerations:

  • DNS as critical infrastructure: too often DNS is managed as a side issue or part of IT operations. In reality, it belongs in the same resilience discussions as cybersecurity, disaster recovery and compliance planning.
  • Multi-provider or multi-cloud DNS strategy: Relying on a single provider creates a single point of failure. By using multiple authoritative DNS providers, organizations can ensure continuity even if a network experiences a disruption.
  • Redundancy and high availability: The DNS infrastructure should be geographically distributed across multiple regions and networks. This reduces latency and ensures failover capabilities in the event of local or regional outages.
  • DNSSEC for integrity: DNS Security Extensions (DNSSEC) add a layer of authentication to DNS responses and prevent attackers from redirecting users to malicious websites through cache poisoning or spoofing.
  • Anomaly monitoring: Proactive monitoring helps to detect faulty requests, misconfigurations or signs of potential DDoS attacks before they escalate. Visibility into DNS traffic is critical to maintaining trust and availability (uptime).
  • Automation: DNS updates, whether for new services, certificates or IP migrations, should be automated to minimize manual errors and propagation delays.

The bottom line: resilience through redundancy

This week's incident was a reminder that authoritative and recursive DNA are equally important but differently vulnerable. Authoritative DNA defines the truth; recursive DNA delivers it. Resilience depends on protecting both.

If one layer fails, the Internet stumbles. But with thoughtful design, i.e. multi-provider redundancy, anycast architecture, automation and monitoring, organizations can keep users connected even when large cloud platforms experience a disruption.

In the end, DNS is more than a protocol; it is the nervous system of the networked world. Its reliability underpins digital trust, brand reputation and business continuity. This week's outage may fade from the headlines, but its lesson remains: Invest in DNS as if your business depended on it. Because it does.

Business Partner

DigiCert Inc.



US

Business Partner contact







most read