DNS Protection's Role in Security Service Edge (SSE) and Secure Access Service Edge (SASE)

Listen to this article instead
4:39


TL;DR:
SASE is broadening—it is about more than just access! It is about endpoint protection and user-based access…and it's called
Security Service Edge (SSE). All of the aspects of the joint NSA and CISA guidance on Protective DNS (PDNS) and user-level policies are part of the secure category, originally launched by Gartner in January 2022. Regardless, it’s been interesting to see the NSA and CISA create guidance recognizing the breadth of cyber protection that DNS protection has to offer.

The security service edge comprises three core services:

  • Secure access to the internet and web by way of a secure web gateway (SWG). Secure Web Gateways protect users from online threats in addition to applying and enforcing corporate acceptable use policies.
  • Secure access to SaaS and cloud apps via a cloud access security broker (CASB)

CASB is a middleman that sits between a user and access to cloud-based apps. It monitors all activities and enforces security policies.

  • Secure remote access to private apps through zero trust network access (ZTNA)

Zero trust network access creates contextual identities at the user level for all applications and tools that may be accessed remotely.

These components are all focused on cybersecurity protection and identity verification at the granular level, and together form the whole of “Security Service Edge” as defined by Gartner.

How Is Security Service Edge Different Than SASE?

SASE is a cloud architecture purpose-built for security. SASE architecture includes the following:

  • Remote access to company resources (versus a traditional VPN setup)
  • Cloud-aware network access with each request inspected
  • Network security and access controls. This can include DNS security, firewalls, and CASB solutions
  • SD-WAN capabilities that optimize traffic across any transport service
  • Threat detection and monitoring

In the SASE framework, network and security services are integrated and delivered via the cloud. There is a software component, a platform or integration component, and a networking component. Security Service Edge (SSE) is a part of SASE that focuses on integrated cloud security at the edge/user level. 

The other component of SASE, the WAN edge piece, focuses on optimization of networking services, including software-defined wide area networking (SD-WAN), WAN optimization and quality of service.

To put it simply, SSE is a pillar that focuses on the security controls of the SASE framework. SASE is more holistic, encompassing the network controls and security for all devices, users, and hardware, and means that new policies are rolled out across the organization with ease.

Where Does DNS Protection Fit into Secure Service Edge?

  • Protective DNS is a key element of a secure web gateway (SWG). In fact, for many businesses, their DNS protection forms the backbone of their secure web gateway, as it is the primary barrier against malware, ransomware, and phishing websites, and is where policies for acceptable use are configured and managed. This is all while providing the necessary reporting, logging, and insights in the dashboard (or to a SIEM) for observability. In legacy contexts, these two elements might be handled by a firewall, but with remote and distributed workforces it has become much more effective to use protective DNS as your secure web gateway.

    • New threats are detected and either automatically blocked via an existing policy, or added to block-lists used by multiple networks, roaming clients, or relays.
    • Policies for web access and content filtering are created from a central location and rolled out instantaneously.
    • DNS protection is typically the only security layer that properly registers DNS-based threats and anomalous DNS activity or traffic.
    • Unlike legacy appliances and hardware, protective DNS is cloud-based and protects users on all device types whether in or out of the office.
    • Reporting and logging provide visibility and enable an understanding as to what is happening on the network, giving end users the ability to drill in and connect protection data to other data via a SIEM.

How To Enhance Your SSE Solution With DNS Security

Adding DNS protection that integrates with your other security tools is a critical component of a Security Service Edge (SSE) minded strategy. It forms a key element of your Secure Web Gateway by inspecting DNS packets, protecting against threats, controlling web access and content filtering, and providing observability.

Search
  • There are no suggestions because the search field is empty.
Latest posts
7 Cybersecurity Predictions for 2026 7 Cybersecurity Predictions for 2026

AI and other technologies are fundamentally reshaping the security world. It’s never too early to prepare, which is why we're dropping our predictions for 2026 ahead of schedule! We went straight to the source, surveying our internal team of cybersecurity and technology specialists to find out where they see the battle lines forming. Here’s what our experts predict.

The Hire the Stakes, The Greater the Fall The Hire the Stakes, The Greater the Fall

Another late night, exhaustion and sore eyes setting in after sending what felt like the thousandth job application on your list, when yet another reply hits your inbox with the words, “Unfortunately we…”You don’t even need to read the rest; you’re familiar enough with how this goes. Woefully, you sit thinking about the work you’ve put into the job search: The degree, the blood, the sweat, the tears—ping.  An email notification graces your frustra...

Risky Apps for Business: Top Malware and Phishing Threats Risky Apps for Business: Top Malware and Phishing Threats

Not all apps are created equal. Some introduce serious risks for phishing, malware, or data breaches, especially when they’re adopted by employees without IT approval. And while blocking a website at the domain can prevent unauthorized access on your network, many applications have hundreds or thousands of domains—simply blocking the main domain might not be enough to prevent access.

Explore More Content

Ready to brush up on something new? We've got even more for you to discover.