2 Answers
Well DDoS on DNS is a very big deal as they are highly redundant, and especially if it is as high profile as AWS. But as we can see it happened. When you are the king of the mountain its a hacker challenge/adventure.
Several mitigations can be done – longer TTLs, multiple DNS Name Servers, Multiple DNS Providers
Route 53 doesn’t support AXFR / zone transfer, so multiple DNS providers is out when using Route 53 as primary. In a true enterprise environment, consider not using Route 53, at least as a primary DNS service.
The environment I currently work in uses an enterprise DNS service for primary, and we do host some subdomains in Route 53, which makes separation of teams and departments easier, as different departments have their own AWS accounts. Also worth considering in a true enterprise environment, Route 53 does not currently support DNSSEC. That might not be a big deal to most people, but in our environment is was the main deal breaker.
Thank you David for your insights.
Good post David. AWS are pretty explicit about this in their documentation as well: https://docs.aws.amazon.com/en_pv/Route53/latest/DeveloperGuide/domain-configure-dnssec.html
Thanks David for the insightful answer. I was not yet aware of DNSSEC until your posted answer after which I researched further and learned a lot. Thanks again!
Thank you Sam