Malicious Domain Blocking and Reporting (MDBR) for U.S. Hospitals FAQ
Overview
What is the Malicious Domain Blocking and Reporting (MDBR) Service?
The MDBR service is a no-cost service available from the Center for Internet Security, Inc. (CIS®), in partnership with Akamai, for U.S.-based hospitals and healthcare organizations. MDBR technology prevents IT systems from connecting to harmful web domains, helping limit infections related to known malware, ransomware, phishing, and other cyber threats. This capability can block the vast majority of ransomware infections just by preventing the initial outreach to a ransomware delivery domain.
Who is Akamai?
Akamai is our selected DNS vendor for the MDBR service. Akamai secures and delivers digital experiences for the world’s largest companies. Akamai’s intelligent edge platform surrounds everything, from the enterprise to the cloud, so customers and their businesses can be fast, smart, and secure. Top brands globally rely on Akamai to help them realize competitive advantage through agile solutions that extend the power of their multi-cloud architectures. Akamai keeps decisions, apps, and experiences closer to users than anyone — and attacks and threats far away. Akamai’s portfolio of edge security, web and mobile performance, enterprise access, and video delivery solutions is supported by unmatched customer service, analytics and, 24/7/365 monitoring. Visit www.akamai.com for more information.
How does MDBR work?
MDBR proactively blocks network traffic from an organization to known harmful web domains, helping protect IT systems against cybersecurity threats.
Once an organization points its domain name system (DNS) requests to Akamai’s DNS server IP addresses (primary and secondary), every DNS lookup will be compared against a list of known and suspected malicious domains. Attempts to access known malicious domains such as those associated with malware, phishing, and ransomware, among other threats, will be blocked and logged. Accepted and blocked DNS request logs will be stored for a period of 30 days.
CIS will provide weekly reporting to each participating entity related to both accepted and blocked requests and assist in remediation, if needed.
What is Akamai Enterprise Threat Protector (ETP)?
Enterprise Threat Protector (ETP) is Akamai’s carrier-grade recursive DNS service that is integrated into the MDBR service. ETP is built on the global Akamai Intelligent Edge Platform and is a quick-to-configure, easy-to-deploy Secure Web Gateway (SWG) that requires no hardware to be installed and maintained.
ETP has multiple layers of protection that leverage real-time Akamai Cloud Security Intelligence and multiple static and dynamic malware-detection engines to proactively identify and block targeted threats such as malware, ransomware, phishing, and DNS-based data exfiltration. Every requested domain is checked against Akamai’s real-time threat intelligence, and requests to identified malicious domains are automatically blocked.
This intelligence is built on data gathered 24/7 from the Akamai Intelligent Edge Platform, which manages up to 30% of global web traffic and delivers up to 2.2 trillion DNS queries daily. Akamai’s intelligence is enhanced with hundreds of external threat feeds, and the combined data set is continuously analyzed and curated using advanced behavioral analysis techniques, machine learning, and proprietary algorithms. As new threats are identified, they are immediately added to the Enterprise Threat Protector service, delivering real-time protection.
How much does the MDBR service cost?
The MDBR service is offered at no-cost for the following U.S.-based hospitals and healthcare organizations:
- independent hospitals not operated by a state, local, tribal or territorial governmental entity;
- multi-hospital systems;
- hospital-based integrated health systems, meaning an organization, consisting of one or more hospitals plus at least one or more group of physicians, that provides comprehensive continuum of care and that are connected to each other through joint ownership or joint management;
- post-acute patient care facilities; and
- psychiatric, rehabilitation or other specialty hospitals.
Public hospitals and other healthcare organizations in the U.S. operated by a state, local, tribal, or territorial governmental entity are also eligible to receive the MDBR service through membership in the Multi-State Information Sharing and Analysis Center (MS-ISAC). MS-ISAC members receive access to the MDBR service, along with a variety of other cybersecurity products and services, at no-cost. Eligible organizations can learn more at https://www.cisecurity.org/ms-isac/.
How does MDBR differ from other DNS filtering services, such as Cisco Umbrella or Quad9?
The MDBR service is similar to other services, such as Cisco Umbrella and Quad9, in that they all block malicious outbound DNS requests. The main differences come down to threat intelligence, logging of DNS look ups, reporting, and the ability to log into a customer portal. While Quad9 offers no logging or reporting capability, most other commercial offerings include these capabilities with the paid version of their service. In most cases, vendors also have a no-cost option that does not offer logging or reporting capabilities. In the case of commercial offerings from Cisco, Akamai, and Cloudflare, customers also have the ability to log into a portal to generate reports and administer the service.
With MDBR, CIS provides weekly reporting related to the blocks that have occurred. Although MDBR users will receive reports from CIS, they will not have the ability to directly log into the Akamai portal, or download logs directly from Akamai. These additional features will be available as a for-fee option from Akamai.
What threat intelligence feeds are used by Akamai and how do they compare to other service providers?
The majority of the threat data in Akamai’s Cloud Security Intelligence comes from data collected on the Akamai platform. Akamai delivers and protects around a third of global web traffic, and resolves 2/3 of the world’s DNS queries daily. This gives Akamai an unprecedented view of the threat landscape. They augment their data with a few third-party threat intelligence feeds and public information, such as WHOIS and domain registration details. All of this data is analyzed using proprietary algorithms that can quickly identify malicious domains contained in this large volume of data. Additionally, the Akamai threat research team further analyzes the data sets, as there are certain types of threats that an automated machine learning process will not easily detect.
How challenging will it be to add MDBR to our environment?
Integrating the MDBR service into your environment is very straightforward and should only take a few minutes to complete. The only requirement to integrate the service is to configure your organization’s local forwarders to send DNS inquiries to Akamai’s primary and secondary recursive DNS servers.
Who do I contact for changes to my MDBR account?
For any post-approval changes to your MDBR account, please submit your changes to the following email address:
Who do I contact if I have further questions?
Registration
How do I sign up for the MDBR service?
The following U.S.-based hospitals and healthcare organizations can register for the MDBR service at https://hospital-mdbr.cisecurity.org/:
- independent hospitals not operated by a state, local, tribal or territorial governmental entity;
- multi-hospital systems;
- hospital-based integrated health systems, meaning an organization, consisting of one or more hospitals plus at least one or more group of physicians, that provides comprehensive continuum of care and that are connected to each other through joint ownership or joint management;
- post-acute patient care facilities; and
- psychiatric, rehabilitation or other specialty hospitals.
Public hospitals in the U.S. operated by a state, local, tribal, or territorial governmental entity are eligible to receive the MDBR service at no-cost through membership in the Multi-State Information Sharing and Analysis Center (MS-ISAC). MS-ISAC members receive access to the MDBR service, along with a variety of other cybersecurity products and services, at no-cost through membership. Eligible organizations can learn more about the MS-ISAC at https://www.cisecurity.org/ms-isac/ and can register for MDBR at https://mdbr.cisecurity.org.
When can I sign up and how long can I leverage the MDBR service?
The MDBR service is available starting on February 16, 2021. For public U.S. hospitals, MDBR is being offered through the Multi-State Information Sharing and Analysis Center (MS-ISAC) as a no-cost service through September 23, 2023. For private U.S. hospitals, MDBR is being offered through CIS as a no-cost services through December 31, 2022, after which, the service will transition to a fee-based offering. More information to come in the near future.
Once I receive the registration email, how many hours is the link in the email valid for before it expires?
The link to complete your registration process will expire in 24 hours. If your onboarding form is not completed before this time period expires, you will have to restart the registration process.
Once our organization’s primary contact receives the enrollment approval email, how many hours is the link in the email valid for before it expires?
The link for your organization’s primary contact to review and approve your registration will expire in 72 hours. If your onboarding form and the MDBR Terms and Conditions are not approved before this time period expires, you will have to restart the registration process.
During the registration process, why is there a question asking if my organization provides DNS resolution services to other organizations?
During the registration process, we ask if your organization provides DNS resolution services to other organizations in order to help us better understand how widely the MDBR service is being utilized. If your organization provides DNS resolution to other organizations, those other organizations would also receive the malicious domain blocking benefits of MDBR, without having to sign up for the service directly. Please note that if you indicate you provide DNS resolution services to other organizations, we will reach out to you directly to request a list of those organizations in order to accurately update our records.
Are the MDBR Terms and Conditions available to be reviewed by our legal department prior to accepting them?
While completing the MDBR onboarding form, I received an error stating “Parameter IPs of value ‘x.x.x.x’ violated a constraint. Invalid IP or CIDR notation.” What does this mean?
This error means that the IP or CIDR information provided is likely not in the proper format. Please confirm that the IP or CIDR block is properly formatted and resubmit the form.
After I sign up, how do I access information related to my organization’s DNS activity?
CIS will provide weekly reporting to each participating entity that includes information related to both blocked and accepted requests and assist in remediation, if needed.
Is there anything I should be aware of, prior to signing up for the MDBR service?
In some cases, organizations that have network perimeter security devices, such as firewalls and web proxies, have been found to make outbound DNS requests for malicious domains which do not originate from compromised systems. This occurs due to these devices proactively making DNS requests related to malicious domains on the device’s block list. This activity has the ability to create false positives within the MDBR service.
If your perimeter devices have the capability to proactively update malicious block lists, it is recommended that DNS requests originating from those particular devices be directed to another DNS provider and not be sent to Akamai.
Please reach out to [email protected] for more information or if you have any questions.
Technical Support
Does MDBR support DNS over HTTPS (DoH)?
DoH is not currently supported by Akamai, but it is something they plan to support in the future. We will keep users updated with new information on DoH support, as we receive it.
Can you provide more details on the information that is logged by MDBR?
The timestamp for the DNS request, the location it comes from (including the NAT IP address of the internet connection), the category and classification of the event, and the domain requested is the only data logged. MDBR does not provide a mechanism for determining which specific machine on a network generated a malicious request. As such, MDBR will not identify specific users as a standalone solution.
- Are only malicious requests or all requests logged?
- The total number of DNS requests is tracked, however, the details described above are logged only for malicious requests.
- Who has access to the logging information?
-
- Members of the CIS staff with Akamai portal access and Akamai technical staff have access to the reporting features.
- How long are logs kept?
- Logs are retained in the Akamai platform for 30 days. CIS has access to download data from Akamai.
- Where can I find more information on logged data?
Does MDBR support real-time log integration or log forwarding to a organization’s SIEM solution?
Real-time log forwarding is not currently available through the MDBR service. At this time, the CIS SOC sends users a weekly report of the malicious blocks that occurred. The report will provide a high-level overview and include information on types of malicious activity associated with the blocked domains, confidence level of the blocks, severity, etc.
How do I get direct access to the Akamai portal and information related to the internal host that made a DNS request?
Access to the Akamai portal, Akamai Security Connector (virtual machine), and ETP software agent can all be purchased from Akamai. These upgraded offerings from Akamai would allow your organization to identify the true source address of the system making a malicious domain request, versus just your organization’s public IP address, among other more advanced features. For more information, contact the Akamai Sales Team directly here.
For U.S.-based public hospitals or other healthcare organizations associated with a state, local, tribal, or territorial governmental entity, CIS has negotiated discounted pricing for Akamai’s upgraded package offerings through CIS CyberMarket. For more information, please visit their CIS CyberMarket page here.
How do I configure my organization’s local forwarders to send DNS inquiries to Akamai?
For instructions on how to set up your organization’s local forwarders, as well as a link for Akamai’s Enterprise Threat Protector Help website for other troubleshooting, you can view the MDBR set up instructions here.
Is there a way to test that our local forwarders were successfully changed to send DNS inquiries to Akamai?
You can use the following URLs to test that your organization’s local forwarders have been configured correctly and Akamai Enterprise Threat Protector is successfully blocking malicious domain requests.
If your local forwarders are configured properly, you will see the following pre-configured block page:
If your local forwarders are not configured correctly and DNS requests are not being sent to Akamai, you will see the following page:
Is the page that appears when malicious domain requests are blocked customizable?
No, the block page is pre-configured and is not able to be customized by organizations using MDBR.
What is the process for false positives?
Please report any false positives you identify to [email protected]. Our SOC will either handle the issue directly, or escalate the issue to Akamai for assistance, if needed.
My organization does not have an internal DNS server. Is an internal DNS server required to sign up for MDBR, or can we manually point each workstation towards the Akamai DNS servers directly?
An internal DNS server is not required. You may configure the DNS settings on each individual machine (DHCP would be the easiest way) or change the DNS settings on your router. If your environment is very small, you may be doing DHCP on your router and could alter both settings on that device. CIS would need to know your organization’s public IP or public CIDR netblock.
Many of our employees work remotely. Assuming no VPN is present, would this disqualify them from utilizing the MDBR service, as they would not have an internal DNS server?
Remote users can still utilize the MDBR service. However, since they are not at a “known” location, their requests would not report to a specific organization’s account. When those users make a malicious domain request, the “Unidentified Location” policy would be applied. The user will be protected from malicious content, but the blocked domain lookups will not be correlated to their organization’s account for reporting purposes.
My organization does not have a static IP address, which is required for accurate reporting. Would my organization be disqualified from the MDBR service, or would we have to update our account every time our IP address changes?
For this situation, your organization would need to set up a dynamic DNS service and then provide that information to [email protected] to set up your account with Akamai.
My organization has an existing security gateway (DNS filter) solution in place. Is it possible to have both MDBR and another secure DNS solution in place at the same time?
Your organization would have to discontinue its existing secure DNS service to utilize the MDBR service, as your DNS requests would be directed to Akamai’s primary and secondary IPs instead of the other secure DNS service.
Is it possible to implement the MDBR service in monitoring-only mode to determine if there are any issues, before allowing it the ability to block domain requests?
At this time, it is not possible to implement MDBR in monitoring-only mode.