SlideShare una empresa de Scribd logo
1 de 31
Internet Society © 1992–2016
MANRS - Mutually Agreed Norms for
Routing Security
A business case for routing security
Kevin Meynell
meynell@isoc.org
18 September 2017
Presentation title – Client name
1
What do a healthy lifestyle and security management have in
common?
2
A Routing Security Primer
The Problem
3
Routing Basics
Routers use Border Gateway Protocol (BGP) to exchange
“reachability information” - networks they know how to reach
Routers build a “routing table” and pick the best route when
sending a packet, typically based on the shortest path.
When talking BGP routers use an Autonomous System Numbers
(ASN) uniquely identifying their network
Almost 60,000 networks (Autonomous Systems) across the
Internet
4
The Problem Caption 10/12pt
Caption body copy
5
Border Gateway Protocol (BGP)
is based on trust
• No built-in validation of the
legitimacy of updates
• The chain of trust spans continents
• Lack of reliable resource data
https://bgpstream.com/
Which leads to …
No Day Without an Incident
7
http://bgpstream.com/
What’s Happening?
IP prefix hijack
• AS announces prefix it doesn’t originate and wins the “best route” selection
• AS announces more specific prefix than what may be announced by originating AS
• AS announces it can route traffic through shorter route, whether it exists or not
• Packets end up being forwarded to wrong part of Internet
• Denial-of-Service (DoS), traffic interception, or impersonating network or service
Route leaks
• Violation of valley-free routing (e.g. re-announcing transit provider routes to another provider)
• Usually due to misconfigurations, but can be used for traffic inspection and reconnaissance
• Can be equally devastating
IP address spoofing
• Creation of IP packets with false source address
• The root cause of reflection DDoS attacks 8
Are There Solutions?
9
Yes!
Prefix and AS-PATH filtering, RPKI, IRR, …
BGPSEC under development at the IETF
Whois, Routing Registries and Peering
databases
But…
• Lack of deployment
• Lack of reliable data
A Tragedy of the Commons
10
From a routing perspective, securing
your own network does not necessarily
make it more secure. Network security
is in someone else’s hands.
— The more hands – the better the security
Is there a clear, visible, and industry-
supported line between good and bad?
— A cultural norm?
A vital part of the security solution
MANRS
Mutually Agreed Norms for Routing Security
11
MANRS was founded with the ambitious goal of
improving the security and reliability of the global
Internet routing system, based on collaboration
among participants and shared responsibility for
Internet infrastructure.
12
Mutually Agreed Norms for
Routing Security
13
MANRS defines four concrete actions that
network operators should implement
— Technology-neutral baseline for global adoption
— A minimum set of requirements
MANRS builds a visible community of security-
minded operators
— Promotes culture of collaborative responsibility
MANRS Actions
Filtering – Prevent propagation of incorrect routing information
• Ensure the correctness of your own announcements and announcements from your customers to
adjacent networks with prefix and AS-path granularity
Anti-spoofing – Prevent traffic with spoofed source IP addresses
• Enable source address validation for at least single-homed stub customer networks, their own end-
users, and infrastructure
Coordination – Facilitate global operational communication and coordination
between network operators
• Maintain globally accessible up-to-date contact information
Global Validation – Facilitate validation of routing information on a global scale
• Publish your data, so others can validate
14
A Note on MANRS’ Limitations
15
MANRS is an absolute minimum an
operator should consider, with low risk
and cost-effective Actions
The more operators implement
MANRS, the fewer routing incidents we
will see, and the smaller will be their
scope
MANRS is not a one-stop solution to all
of the internet’s routing woes, but it is
an important step toward a globally
robust and secure routing infrastructure
A study with 451 Research
So what is the business case for
MANRS?
(and routing security)
16
Questionnaire-based study
— Assessment against existing 451 Research data
— Common perception elements
Service providers
— Initial targeting interviews
– Global demographic
— 25 telephone interviews
Enterprise Internet teams
— 250 web questionnaires
— 1,000 employee minimum
— Primarily North America
17
14%
14%
11%
10%10%
8%
8%
6%
19%
Enterprise Demographics
Manufacturing
Professional Services
Retail
Telecommunications
Health
Financial
Insurance
Construction
Other
Comprehensive Research Study
Enterprises Are Concerned About Security
A core value for a majority
Smaller enterprises had an outsized
concern about security as part of their
primary values
18
0%
10%
20%
30%
40%
50%
1000 - 2499 2500 - 4999 5000 - 9999 10,000 +
Primary Core Value
Part of Our Values
Not Distinguishing
Enterprise Concerns Around Security
— Widely varying concerns across a
range of issues
— Security focus is aligned with type of
issues MANRS is looking to address
And confidence that MANRS can help 19
0%
10%
20%
30%
40%
50%
60%
70%
80%
DDoS Traffic hijacking Address spoofing Availability Blacklisting
57%
74%
57%
46%
28%
Internet Security Concerns
And Enterprises are Willing to Pay for MANRS
Significant value on security posture
— Median premium of 15%
— 13% would only choose MANRS
compliant providers
20
0
10
20
30
40
50
60
70
no 5% more 10% 15% 20% 25% I would only
choose a
MANRS
Compliant
services
Q: Would you pay a premium for MANRS compliant services?
Service Provider motivations are misaligned with Enterprise
perception
No one mentioned customer demands as a
reason
21
0%
5%
10%
15%
20%
25%
30%
35%
40%
Being a good
internet citizen
Being more
secure
Increasing
operating
efficiency
Regulatory
compliance
16%
36%
12%
36%
Reasons for Implementation
Q: Which aspect of MANRS would provide the greatest reason for implementing for your
organization?
What We Learned from the Study
Security is Vital to Enterprises
• MANRS knowledge is low, but MANRS attributes are highly valued
• Enterprises are willing to put MANRS compliance into RFPs and require it of their
service providers
MANRS Adds Value for Service Providers
• Service providers can differentiate from their competitors; Identifiable value in a
vague market
• Service providers may be able to add additional revenue streams based on
information security feeds and other add-on services
• MANRS compliance may reduce customer churn
22
Why SERVICE PROVIDERS Should Join MANRS
• MANRS is a sign of security proficiency and commitment
• MANRS is one indication that a provider is contributing to solving network
problems at a global scale
• MANRS distinction can add competitive value and enhance operational
effectiveness
• Enterprises indicate willingness to pay more for partnering with a provider with
high security posture
23
Why ENTERPRISES Should Require MANRS
• MANRS communicates an enterprise’s security investment to its customers
• Larger enterprises with peering arrangements that involve BGP can
incorporate the MANRS actions into IT operations, which can add maturity
and increase operational efficiency
• Enterprises can require MANRS compliance in RFPs, tender, and purchasing
processes
• In regulated industries, MANRS can be an additional factor for auditors to
consider when assessing the overall security posture of an organization
24
Commit to Routing Security,
Collaborative Action, and the Good of the
Internet
Join MANRS Today
25
Can you stand up publicly and say:
- I care about routing security
- I am prepared to spend resources on it
- I am prepared to be held accountable by the
community
Join Us
26
Visit www.manrs.org/signup
• Fill out the form with as much detail as
possible.
• We may ask questions and run tests
Get Involved in the Community
• Members support the initiative and
implement the actions in their own
networks
• Members maintain and improve the
document and promote MANRS objectives
MANRS Implementation Guide
• Providing guidance to implement MANRS principles
• Based on Best Current Operational Practices deployed by
network operators around the world
• http://www.routingmanifesto.org/bcop/
27
What’s Next: MANRS IXP Partnership Programme
There is synergy between MANRS and IXPs
— IXPs form a community with a common operational objective
— MANRS is a reference point with a global presence – useful for building a “safe neighborhood”
How can IXPs contribute?
— Technical measures: Route Server with validation, alerting on unwanted traffic, providing debugging and
monitoring tools
— Social measures: MANRS ambassador role, local audit as part of the on-boarding process
— A development team is working on a set of useful actions
28
What’s Next: MANRS Training and Certification
Routing security is hard. How can we make it more accessible? The “simple” MANRS
Implementation Guide turned into a 50-page document that assumes a certain level of expertise.
Online training modules
— Based on the MANRS Implementation Guide
— Walks a student through the tutorial with a test at the end
— Working with and looking for partners that are interested in integrating it in their curricula
A hands-on lab to achieve MANRS certification
— Completing the online modules as a first step in MANRS certification
— Looking for partners
29
30
LEARN MORE:
www.manrs.org
Visit us at
www.internetsociety.org
Follow us
@internetsociety
Galerie Jean-Malbuisson 15,
CH-1204 Geneva,
Switzerland.
+41 22 807 1444
1775 Wiehle Avenue,
Suite 201, Reston, VA
20190-5108 USA.
+1 703 439 2120
Thank you.
Andrei Robachevsky
robachevsky@isoc.org
31

Más contenido relacionado

La actualidad más candente

PRFP-10: Cyber threats and security in the Pacific
PRFP-10: Cyber threats and security in the PacificPRFP-10: Cyber threats and security in the Pacific
PRFP-10: Cyber threats and security in the PacificAPNIC
 
Collective responsibility for security and resilience of the global routing s...
Collective responsibility for security and resilience of the global routing s...Collective responsibility for security and resilience of the global routing s...
Collective responsibility for security and resilience of the global routing s...APNIC
 
APNIC update PNG IXP Inauguration
APNIC update PNG IXP InaugurationAPNIC update PNG IXP Inauguration
APNIC update PNG IXP InaugurationAPNIC
 
Tech 2 Tech IPv6 presentation
Tech 2 Tech IPv6 presentationTech 2 Tech IPv6 presentation
Tech 2 Tech IPv6 presentationJisc
 
Cyber Security Week 2015: Get involved and contribute
Cyber Security Week 2015: Get involved and contributeCyber Security Week 2015: Get involved and contribute
Cyber Security Week 2015: Get involved and contributeAPNIC
 
NTT-CERT Activities by Yoshiki Sugiura [APRICOT 2015]
NTT-CERT Activities by Yoshiki Sugiura [APRICOT 2015]NTT-CERT Activities by Yoshiki Sugiura [APRICOT 2015]
NTT-CERT Activities by Yoshiki Sugiura [APRICOT 2015]APNIC
 

La actualidad más candente (20)

ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
 
ION Islamabad - What's Happening at the IETF?
ION Islamabad - What's Happening at the IETF?ION Islamabad - What's Happening at the IETF?
ION Islamabad - What's Happening at the IETF?
 
ION Hangzhou - Keynote: Collaborative Security and an Open Internet
ION Hangzhou - Keynote: Collaborative Security and an Open InternetION Hangzhou - Keynote: Collaborative Security and an Open Internet
ION Hangzhou - Keynote: Collaborative Security and an Open Internet
 
ION Hangzhou - Opening Remarks
ION Hangzhou - Opening RemarksION Hangzhou - Opening Remarks
ION Hangzhou - Opening Remarks
 
PRFP-10: Cyber threats and security in the Pacific
PRFP-10: Cyber threats and security in the PacificPRFP-10: Cyber threats and security in the Pacific
PRFP-10: Cyber threats and security in the Pacific
 
ION Belgrade - IETF Update
ION Belgrade - IETF UpdateION Belgrade - IETF Update
ION Belgrade - IETF Update
 
ION Hangzhou - About IETF
ION Hangzhou - About IETFION Hangzhou - About IETF
ION Hangzhou - About IETF
 
ION Malta - Closing Slides
ION Malta - Closing SlidesION Malta - Closing Slides
ION Malta - Closing Slides
 
ION Belgrade - MANRS by Serbian Open eXchange (SOX)
ION Belgrade - MANRS by Serbian Open eXchange (SOX)ION Belgrade - MANRS by Serbian Open eXchange (SOX)
ION Belgrade - MANRS by Serbian Open eXchange (SOX)
 
ION Hangzhou - An IETF Journey for CNNIC
ION Hangzhou - An IETF Journey for CNNICION Hangzhou - An IETF Journey for CNNIC
ION Hangzhou - An IETF Journey for CNNIC
 
Status of IPv6 in Pakistan
Status of IPv6 in PakistanStatus of IPv6 in Pakistan
Status of IPv6 in Pakistan
 
ION Durban - MANRS Introduction
ION Durban - MANRS IntroductionION Durban - MANRS Introduction
ION Durban - MANRS Introduction
 
ION Islamabad - IPv6 - Delegations, Deployments and Trends
ION Islamabad - IPv6 - Delegations, Deployments and TrendsION Islamabad - IPv6 - Delegations, Deployments and Trends
ION Islamabad - IPv6 - Delegations, Deployments and Trends
 
Collective responsibility for security and resilience of the global routing s...
Collective responsibility for security and resilience of the global routing s...Collective responsibility for security and resilience of the global routing s...
Collective responsibility for security and resilience of the global routing s...
 
APNIC update PNG IXP Inauguration
APNIC update PNG IXP InaugurationAPNIC update PNG IXP Inauguration
APNIC update PNG IXP Inauguration
 
Tech 2 Tech IPv6 presentation
Tech 2 Tech IPv6 presentationTech 2 Tech IPv6 presentation
Tech 2 Tech IPv6 presentation
 
Cyber Security Week 2015: Get involved and contribute
Cyber Security Week 2015: Get involved and contributeCyber Security Week 2015: Get involved and contribute
Cyber Security Week 2015: Get involved and contribute
 
ION Cape Town - Opening Remarks
ION Cape Town - Opening RemarksION Cape Town - Opening Remarks
ION Cape Town - Opening Remarks
 
ION Durban - What's Happening at the IETF?
ION Durban - What's Happening at the IETF?ION Durban - What's Happening at the IETF?
ION Durban - What's Happening at the IETF?
 
NTT-CERT Activities by Yoshiki Sugiura [APRICOT 2015]
NTT-CERT Activities by Yoshiki Sugiura [APRICOT 2015]NTT-CERT Activities by Yoshiki Sugiura [APRICOT 2015]
NTT-CERT Activities by Yoshiki Sugiura [APRICOT 2015]
 

Similar a ION Malta - MANRS Introduction

Two years of good MANRS
Two years of good MANRSTwo years of good MANRS
Two years of good MANRSAPNIC
 
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...Deploy360 Programme (Internet Society)
 
MANRS - Introduction to Internet Routing Security
MANRS - Introduction to Internet Routing SecurityMANRS - Introduction to Internet Routing Security
MANRS - Introduction to Internet Routing SecurityObika Gellineau
 
Reliable Resource Data
Reliable Resource DataReliable Resource Data
Reliable Resource DataAPNIC
 
Sify - IT Management Services
Sify - IT Management ServicesSify - IT Management Services
Sify - IT Management Serviceswebhostingguy
 
Cloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran RocheCloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran RocheCiaran Roche
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs
 
SDN & NFV: Driving Additional Value into Managed Services
SDN & NFV: Driving Additional Value into Managed ServicesSDN & NFV: Driving Additional Value into Managed Services
SDN & NFV: Driving Additional Value into Managed ServicesTBI Inc.
 
Mpls vpn-business-ready-networks
Mpls vpn-business-ready-networksMpls vpn-business-ready-networks
Mpls vpn-business-ready-networksSuvarna Vaidya
 
ITAM UK 2017_Implementing a global award winning SAM program_Jochen Hagenlocher
ITAM UK 2017_Implementing a global award winning SAM program_Jochen HagenlocherITAM UK 2017_Implementing a global award winning SAM program_Jochen Hagenlocher
ITAM UK 2017_Implementing a global award winning SAM program_Jochen HagenlocherMartin Thompson
 
PLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It Together
PLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It TogetherPLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It Together
PLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It TogetherPROIDEA
 
CyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT SecurityCyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT SecurityHaluk Demirkan
 
“Security” In a Digital Interconnected World
“Security” In a Digital Interconnected World “Security” In a Digital Interconnected World
“Security” In a Digital Interconnected World Internet Society
 
Bringing the Cloud Back to Earth
Bringing the Cloud Back to EarthBringing the Cloud Back to Earth
Bringing the Cloud Back to EarthSri Chalasani
 

Similar a ION Malta - MANRS Introduction (20)

Two years of good MANRS
Two years of good MANRSTwo years of good MANRS
Two years of good MANRS
 
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
 
MANRS - Introduction to Internet Routing Security
MANRS - Introduction to Internet Routing SecurityMANRS - Introduction to Internet Routing Security
MANRS - Introduction to Internet Routing Security
 
Improving routing security through concerted action
Improving routing security through concerted actionImproving routing security through concerted action
Improving routing security through concerted action
 
AusNOG - Two Years of Good MANRS
AusNOG - Two Years of Good MANRSAusNOG - Two Years of Good MANRS
AusNOG - Two Years of Good MANRS
 
Reliable Resource Data
Reliable Resource DataReliable Resource Data
Reliable Resource Data
 
Stephen Wallo
Stephen WalloStephen Wallo
Stephen Wallo
 
Webinar connectivity vs hybrid networking
Webinar connectivity vs hybrid networkingWebinar connectivity vs hybrid networking
Webinar connectivity vs hybrid networking
 
Sify - IT Management Services
Sify - IT Management ServicesSify - IT Management Services
Sify - IT Management Services
 
Cloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran RocheCloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran Roche
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services
 
SDN & NFV: Driving Additional Value into Managed Services
SDN & NFV: Driving Additional Value into Managed ServicesSDN & NFV: Driving Additional Value into Managed Services
SDN & NFV: Driving Additional Value into Managed Services
 
Mpls vpn-business-ready-networks
Mpls vpn-business-ready-networksMpls vpn-business-ready-networks
Mpls vpn-business-ready-networks
 
ITAM UK 2017_Implementing a global award winning SAM program_Jochen Hagenlocher
ITAM UK 2017_Implementing a global award winning SAM program_Jochen HagenlocherITAM UK 2017_Implementing a global award winning SAM program_Jochen Hagenlocher
ITAM UK 2017_Implementing a global award winning SAM program_Jochen Hagenlocher
 
Losing Control to the Cloud
Losing Control to the CloudLosing Control to the Cloud
Losing Control to the Cloud
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
 
PLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It Together
PLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It TogetherPLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It Together
PLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It Together
 
CyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT SecurityCyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT Security
 
“Security” In a Digital Interconnected World
“Security” In a Digital Interconnected World “Security” In a Digital Interconnected World
“Security” In a Digital Interconnected World
 
Bringing the Cloud Back to Earth
Bringing the Cloud Back to EarthBringing the Cloud Back to Earth
Bringing the Cloud Back to Earth
 

Más de Deploy360 Programme (Internet Society)

ION Costa Rica - Setting the Scene: IPv6 Deployment in Costa Rica and Latin A...
ION Costa Rica - Setting the Scene: IPv6 Deployment in Costa Rica and Latin A...ION Costa Rica - Setting the Scene: IPv6 Deployment in Costa Rica and Latin A...
ION Costa Rica - Setting the Scene: IPv6 Deployment in Costa Rica and Latin A...Deploy360 Programme (Internet Society)
 

Más de Deploy360 Programme (Internet Society) (16)

ION Belgrade - Jordi Palet Martinez IPv6 Success Stories
ION Belgrade - Jordi Palet Martinez IPv6 Success StoriesION Belgrade - Jordi Palet Martinez IPv6 Success Stories
ION Belgrade - Jordi Palet Martinez IPv6 Success Stories
 
ION Belgrade - ISOC Serbia Belgrade Chapter Presentation
ION Belgrade - ISOC Serbia Belgrade Chapter PresentationION Belgrade - ISOC Serbia Belgrade Chapter Presentation
ION Belgrade - ISOC Serbia Belgrade Chapter Presentation
 
ION Belgrade - Opening Slides
ION Belgrade - Opening SlidesION Belgrade - Opening Slides
ION Belgrade - Opening Slides
 
ION Belgrade - Closing Slides
ION Belgrade - Closing SlidesION Belgrade - Closing Slides
ION Belgrade - Closing Slides
 
ION Malta - Seeweb Why MANRS is good for you
ION Malta - Seeweb Why MANRS is good for youION Malta - Seeweb Why MANRS is good for you
ION Malta - Seeweb Why MANRS is good for you
 
ION Durban - How peering behaviour affects growth of the internet
ION Durban - How peering behaviour affects growth of the internetION Durban - How peering behaviour affects growth of the internet
ION Durban - How peering behaviour affects growth of the internet
 
ION Durban - Introduction to ISOC Gauteng Chapter
ION Durban - Introduction to ISOC Gauteng ChapterION Durban - Introduction to ISOC Gauteng Chapter
ION Durban - Introduction to ISOC Gauteng Chapter
 
ION Durban - NAT64/DNS64 Experiments and the NAT64Check Tool
ION Durban - NAT64/DNS64 Experiments and the NAT64Check ToolION Durban - NAT64/DNS64 Experiments and the NAT64Check Tool
ION Durban - NAT64/DNS64 Experiments and the NAT64Check Tool
 
ION Durban - Closing Slides
ION Durban - Closing SlidesION Durban - Closing Slides
ION Durban - Closing Slides
 
ION Durban - DNSSEC, and Why We Can't Avoid It
ION Durban - DNSSEC, and Why We Can't Avoid ItION Durban - DNSSEC, and Why We Can't Avoid It
ION Durban - DNSSEC, and Why We Can't Avoid It
 
ION Durban - IPv6 Case Study (Liquid Telecom)
ION Durban - IPv6 Case Study (Liquid Telecom)ION Durban - IPv6 Case Study (Liquid Telecom)
ION Durban - IPv6 Case Study (Liquid Telecom)
 
ION Durban - Opening Slides
ION Durban - Opening SlidesION Durban - Opening Slides
ION Durban - Opening Slides
 
ION Costa Rica - About the IETF and How to Get Involved
ION Costa Rica - About the IETF and How to Get InvolvedION Costa Rica - About the IETF and How to Get Involved
ION Costa Rica - About the IETF and How to Get Involved
 
ION Costa Rica - Closing Slides
ION Costa Rica - Closing SlidesION Costa Rica - Closing Slides
ION Costa Rica - Closing Slides
 
ION Costa Rica - Validacion en el origen
ION Costa Rica - Validacion en el origenION Costa Rica - Validacion en el origen
ION Costa Rica - Validacion en el origen
 
ION Costa Rica - Setting the Scene: IPv6 Deployment in Costa Rica and Latin A...
ION Costa Rica - Setting the Scene: IPv6 Deployment in Costa Rica and Latin A...ION Costa Rica - Setting the Scene: IPv6 Deployment in Costa Rica and Latin A...
ION Costa Rica - Setting the Scene: IPv6 Deployment in Costa Rica and Latin A...
 

Último

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 

Último (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 

ION Malta - MANRS Introduction

  • 1. Internet Society © 1992–2016 MANRS - Mutually Agreed Norms for Routing Security A business case for routing security Kevin Meynell meynell@isoc.org 18 September 2017 Presentation title – Client name 1
  • 2. What do a healthy lifestyle and security management have in common? 2
  • 3. A Routing Security Primer The Problem 3
  • 4. Routing Basics Routers use Border Gateway Protocol (BGP) to exchange “reachability information” - networks they know how to reach Routers build a “routing table” and pick the best route when sending a packet, typically based on the shortest path. When talking BGP routers use an Autonomous System Numbers (ASN) uniquely identifying their network Almost 60,000 networks (Autonomous Systems) across the Internet 4
  • 5. The Problem Caption 10/12pt Caption body copy 5 Border Gateway Protocol (BGP) is based on trust • No built-in validation of the legitimacy of updates • The chain of trust spans continents • Lack of reliable resource data
  • 7. No Day Without an Incident 7 http://bgpstream.com/
  • 8. What’s Happening? IP prefix hijack • AS announces prefix it doesn’t originate and wins the “best route” selection • AS announces more specific prefix than what may be announced by originating AS • AS announces it can route traffic through shorter route, whether it exists or not • Packets end up being forwarded to wrong part of Internet • Denial-of-Service (DoS), traffic interception, or impersonating network or service Route leaks • Violation of valley-free routing (e.g. re-announcing transit provider routes to another provider) • Usually due to misconfigurations, but can be used for traffic inspection and reconnaissance • Can be equally devastating IP address spoofing • Creation of IP packets with false source address • The root cause of reflection DDoS attacks 8
  • 9. Are There Solutions? 9 Yes! Prefix and AS-PATH filtering, RPKI, IRR, … BGPSEC under development at the IETF Whois, Routing Registries and Peering databases But… • Lack of deployment • Lack of reliable data
  • 10. A Tragedy of the Commons 10 From a routing perspective, securing your own network does not necessarily make it more secure. Network security is in someone else’s hands. — The more hands – the better the security Is there a clear, visible, and industry- supported line between good and bad? — A cultural norm?
  • 11. A vital part of the security solution MANRS Mutually Agreed Norms for Routing Security 11
  • 12. MANRS was founded with the ambitious goal of improving the security and reliability of the global Internet routing system, based on collaboration among participants and shared responsibility for Internet infrastructure. 12
  • 13. Mutually Agreed Norms for Routing Security 13 MANRS defines four concrete actions that network operators should implement — Technology-neutral baseline for global adoption — A minimum set of requirements MANRS builds a visible community of security- minded operators — Promotes culture of collaborative responsibility
  • 14. MANRS Actions Filtering – Prevent propagation of incorrect routing information • Ensure the correctness of your own announcements and announcements from your customers to adjacent networks with prefix and AS-path granularity Anti-spoofing – Prevent traffic with spoofed source IP addresses • Enable source address validation for at least single-homed stub customer networks, their own end- users, and infrastructure Coordination – Facilitate global operational communication and coordination between network operators • Maintain globally accessible up-to-date contact information Global Validation – Facilitate validation of routing information on a global scale • Publish your data, so others can validate 14
  • 15. A Note on MANRS’ Limitations 15 MANRS is an absolute minimum an operator should consider, with low risk and cost-effective Actions The more operators implement MANRS, the fewer routing incidents we will see, and the smaller will be their scope MANRS is not a one-stop solution to all of the internet’s routing woes, but it is an important step toward a globally robust and secure routing infrastructure
  • 16. A study with 451 Research So what is the business case for MANRS? (and routing security) 16
  • 17. Questionnaire-based study — Assessment against existing 451 Research data — Common perception elements Service providers — Initial targeting interviews – Global demographic — 25 telephone interviews Enterprise Internet teams — 250 web questionnaires — 1,000 employee minimum — Primarily North America 17 14% 14% 11% 10%10% 8% 8% 6% 19% Enterprise Demographics Manufacturing Professional Services Retail Telecommunications Health Financial Insurance Construction Other Comprehensive Research Study
  • 18. Enterprises Are Concerned About Security A core value for a majority Smaller enterprises had an outsized concern about security as part of their primary values 18 0% 10% 20% 30% 40% 50% 1000 - 2499 2500 - 4999 5000 - 9999 10,000 + Primary Core Value Part of Our Values Not Distinguishing
  • 19. Enterprise Concerns Around Security — Widely varying concerns across a range of issues — Security focus is aligned with type of issues MANRS is looking to address And confidence that MANRS can help 19 0% 10% 20% 30% 40% 50% 60% 70% 80% DDoS Traffic hijacking Address spoofing Availability Blacklisting 57% 74% 57% 46% 28% Internet Security Concerns
  • 20. And Enterprises are Willing to Pay for MANRS Significant value on security posture — Median premium of 15% — 13% would only choose MANRS compliant providers 20 0 10 20 30 40 50 60 70 no 5% more 10% 15% 20% 25% I would only choose a MANRS Compliant services Q: Would you pay a premium for MANRS compliant services?
  • 21. Service Provider motivations are misaligned with Enterprise perception No one mentioned customer demands as a reason 21 0% 5% 10% 15% 20% 25% 30% 35% 40% Being a good internet citizen Being more secure Increasing operating efficiency Regulatory compliance 16% 36% 12% 36% Reasons for Implementation Q: Which aspect of MANRS would provide the greatest reason for implementing for your organization?
  • 22. What We Learned from the Study Security is Vital to Enterprises • MANRS knowledge is low, but MANRS attributes are highly valued • Enterprises are willing to put MANRS compliance into RFPs and require it of their service providers MANRS Adds Value for Service Providers • Service providers can differentiate from their competitors; Identifiable value in a vague market • Service providers may be able to add additional revenue streams based on information security feeds and other add-on services • MANRS compliance may reduce customer churn 22
  • 23. Why SERVICE PROVIDERS Should Join MANRS • MANRS is a sign of security proficiency and commitment • MANRS is one indication that a provider is contributing to solving network problems at a global scale • MANRS distinction can add competitive value and enhance operational effectiveness • Enterprises indicate willingness to pay more for partnering with a provider with high security posture 23
  • 24. Why ENTERPRISES Should Require MANRS • MANRS communicates an enterprise’s security investment to its customers • Larger enterprises with peering arrangements that involve BGP can incorporate the MANRS actions into IT operations, which can add maturity and increase operational efficiency • Enterprises can require MANRS compliance in RFPs, tender, and purchasing processes • In regulated industries, MANRS can be an additional factor for auditors to consider when assessing the overall security posture of an organization 24
  • 25. Commit to Routing Security, Collaborative Action, and the Good of the Internet Join MANRS Today 25 Can you stand up publicly and say: - I care about routing security - I am prepared to spend resources on it - I am prepared to be held accountable by the community
  • 26. Join Us 26 Visit www.manrs.org/signup • Fill out the form with as much detail as possible. • We may ask questions and run tests Get Involved in the Community • Members support the initiative and implement the actions in their own networks • Members maintain and improve the document and promote MANRS objectives
  • 27. MANRS Implementation Guide • Providing guidance to implement MANRS principles • Based on Best Current Operational Practices deployed by network operators around the world • http://www.routingmanifesto.org/bcop/ 27
  • 28. What’s Next: MANRS IXP Partnership Programme There is synergy between MANRS and IXPs — IXPs form a community with a common operational objective — MANRS is a reference point with a global presence – useful for building a “safe neighborhood” How can IXPs contribute? — Technical measures: Route Server with validation, alerting on unwanted traffic, providing debugging and monitoring tools — Social measures: MANRS ambassador role, local audit as part of the on-boarding process — A development team is working on a set of useful actions 28
  • 29. What’s Next: MANRS Training and Certification Routing security is hard. How can we make it more accessible? The “simple” MANRS Implementation Guide turned into a 50-page document that assumes a certain level of expertise. Online training modules — Based on the MANRS Implementation Guide — Walks a student through the tutorial with a test at the end — Working with and looking for partners that are interested in integrating it in their curricula A hands-on lab to achieve MANRS certification — Completing the online modules as a first step in MANRS certification — Looking for partners 29
  • 31. Visit us at www.internetsociety.org Follow us @internetsociety Galerie Jean-Malbuisson 15, CH-1204 Geneva, Switzerland. +41 22 807 1444 1775 Wiehle Avenue, Suite 201, Reston, VA 20190-5108 USA. +1 703 439 2120 Thank you. Andrei Robachevsky robachevsky@isoc.org 31

Notas del editor

  1. What’s the commonality between a healthy lifestyle and security management? They both sound good in theory –everyone wants to be healthy - but in the short term you don’t feel any better after eating a cup of broccoli. Skipping the the cake - or spending resources on security management - does not visibly make any difference. At least in short term. We all know someone who lived a long life despite an unhealthy lifestyle, or a company that never got attacked or hacked.  It takes years of healthy choices to make, and see, a difference.
  2. Plenty of evidence