Understanding How Multi-Tenant DNS Works

Managing Companies in Securd DNS

With Securd DNS, you can create and manage multiple Companies—logical tenants that enable secure DNS segregation across organizations, customers, or internal business units.

Each Company operates as an isolated tenant within the Securd system, ensuring dedicated configuration, data separation, and policy control.


🔑 What is a Company in Securd?

A Company in Securd represents a logically distinct tenant within the platform. This allows administrators to deploy Securd DNS across multiple environments or clients while maintaining strict data and configuration separation.

Each Company is identified by:

  • A Company Name
  • A globally unique identifier (GUID) that is tied to the tenant

This structure is ideal for managed service providers (MSPs), large enterprises, or organizations with multi-tenant DNS policy requirements.


🧩 Company-Level Configuration

Each Securd Company includes its own unique configuration settings:

  • Domain Suffix Exclusion: Define domain patterns to bypass DNS filtering.
  • Grey Wall Defense: Configure active defense timing and response behavior.
  • Log Retention Policies: Set how long DNS logs are retained.
  • Log Forwarding Options: Enable forwarding of DNS activity to SIEM or storage solutions.
  • Alert Settings: Manage DNS alert thresholds and recipients.
  • PagerDuty Integration: Connect Company alerts with PagerDuty incident response workflows.
  • Branding Settings: Customize the DNS block page and UI branding per Company.

These settings ensure each tenant can operate under its own policy framework while using shared infrastructure.

⚠️

Note: All security policies within a Company automatically inherit the Company’s configuration values.


🔒 Company Isolation in Multi-Tenant Environments

Each Company is isolated to ensure data integrity and tenant security. The following elements are completely separated between tenants:

  • Configuration Data
  • DNS Log Data
  • Security Policies
  • Block Lists
  • Site Inventory
  • Virtual Site Inventory
  • DoH URL Inventory
  • Device Inventory
  • DNS Activity Inventory
  • Administrative User Access

This strict isolation model is critical for compliance, data privacy, and operational clarity across organizations that require DNS filtering and threat response in a multi-tenant context.