By implementing DNSSEC, you introduce cryptographic certainty that when a person looks up a Domain Name with DNSSEC validation enabled, the answer received will be correct. In order to perform DNSSEC validation, there needs to be a trusted chain of signatures from the root zone (the invisible ‘dot’ at the end of a Domain Name), down to the right most component of a FQDN (Fully Qualified Domain Name) – e.g. www.registry.net.za
Any “gap” in the chain invalidates the DNSSEC validation, therefore it prohibits people below you on the DNS chain from being able to secure their own DNS.
A secured Zone also allows other material to be included into the Zone, such as TLSA records – which helps authenticate that SSL certificates that Secured Web sites use are in fact correct.
There are two methods to sign your zone that will be mentioned below – BIND or OpenDNSSEC. The Software is usually run on Linux (*nix) type systems.
In looking at the the provided methods of signing, you will see reference to the terms NSEC and NSEC3. For a Second Level Domain, you should choose NSEC3 over NSEC signing, which will stop your zone from being enumerated.
The other useful piece of information is that a nameserver should only have one role, it should either have Zones (authoritative) or be able to look up information (recursive). It should not do both – do not mix these roles. In order to test that DNSSEC is working, you need to ask a Recursive machine that can chase down signatures from the Root. Asking the Authoritative server directly will not work.