SlideShare a Scribd company logo
Internet Society © 1992–2016
MANRS - Mutually Agreed Norms for
Routing Security
A business case for routing security
Kevin Meynell
meynell@isoc.org
18 September 2017
Presentation title – Client name
1
What do a healthy lifestyle and security management have in
common?
2
A Routing Security Primer
The Problem
3
Routing Basics
Routers use Border Gateway Protocol (BGP) to exchange
“reachability information” - networks they know how to reach
Routers build a “routing table” and pick the best route when
sending a packet, typically based on the shortest path.
When talking BGP routers use an Autonomous System Numbers
(ASN) uniquely identifying their network
Almost 60,000 networks (Autonomous Systems) across the
Internet
4
The Problem Caption 10/12pt
Caption body copy
5
Border Gateway Protocol (BGP)
is based on trust
• No built-in validation of the
legitimacy of updates
• The chain of trust spans continents
• Lack of reliable resource data
https://bgpstream.com/
Which leads to …
No Day Without an Incident
7
http://bgpstream.com/
What’s Happening?
IP prefix hijack
• AS announces prefix it doesn’t originate and wins the “best route” selection
• AS announces more specific prefix than what may be announced by originating AS
• AS announces it can route traffic through shorter route, whether it exists or not
• Packets end up being forwarded to wrong part of Internet
• Denial-of-Service (DoS), traffic interception, or impersonating network or service
Route leaks
• Violation of valley-free routing (e.g. re-announcing transit provider routes to another provider)
• Usually due to misconfigurations, but can be used for traffic inspection and reconnaissance
• Can be equally devastating
IP address spoofing
• Creation of IP packets with false source address
• The root cause of reflection DDoS attacks 8
Are There Solutions?
9
Yes!
Prefix and AS-PATH filtering, RPKI, IRR, …
BGPSEC under development at the IETF
Whois, Routing Registries and Peering
databases
But…
• Lack of deployment
• Lack of reliable data
A Tragedy of the Commons
10
From a routing perspective, securing
your own network does not necessarily
make it more secure. Network security
is in someone else’s hands.
— The more hands – the better the security
Is there a clear, visible, and industry-
supported line between good and bad?
— A cultural norm?
A vital part of the security solution
MANRS
Mutually Agreed Norms for Routing Security
11
MANRS was founded with the ambitious goal of
improving the security and reliability of the global
Internet routing system, based on collaboration
among participants and shared responsibility for
Internet infrastructure.
12
Mutually Agreed Norms for
Routing Security
13
MANRS defines four concrete actions that
network operators should implement
— Technology-neutral baseline for global adoption
— A minimum set of requirements
MANRS builds a visible community of security-
minded operators
— Promotes culture of collaborative responsibility
MANRS Actions
Filtering – Prevent propagation of incorrect routing information
• Ensure the correctness of your own announcements and announcements from your customers to
adjacent networks with prefix and AS-path granularity
Anti-spoofing – Prevent traffic with spoofed source IP addresses
• Enable source address validation for at least single-homed stub customer networks, their own end-
users, and infrastructure
Coordination – Facilitate global operational communication and coordination
between network operators
• Maintain globally accessible up-to-date contact information
Global Validation – Facilitate validation of routing information on a global scale
• Publish your data, so others can validate
14
A Note on MANRS’ Limitations
15
MANRS is an absolute minimum an
operator should consider, with low risk
and cost-effective Actions
The more operators implement
MANRS, the fewer routing incidents we
will see, and the smaller will be their
scope
MANRS is not a one-stop solution to all
of the internet’s routing woes, but it is
an important step toward a globally
robust and secure routing infrastructure
A study with 451 Research
So what is the business case for
MANRS?
(and routing security)
16
Questionnaire-based study
— Assessment against existing 451 Research data
— Common perception elements
Service providers
— Initial targeting interviews
– Global demographic
— 25 telephone interviews
Enterprise Internet teams
— 250 web questionnaires
— 1,000 employee minimum
— Primarily North America
17
14%
14%
11%
10%10%
8%
8%
6%
19%
Enterprise Demographics
Manufacturing
Professional Services
Retail
Telecommunications
Health
Financial
Insurance
Construction
Other
Comprehensive Research Study
Enterprises Are Concerned About Security
A core value for a majority
Smaller enterprises had an outsized
concern about security as part of their
primary values
18
0%
10%
20%
30%
40%
50%
1000 - 2499 2500 - 4999 5000 - 9999 10,000 +
Primary Core Value
Part of Our Values
Not Distinguishing
Enterprise Concerns Around Security
— Widely varying concerns across a
range of issues
— Security focus is aligned with type of
issues MANRS is looking to address
And confidence that MANRS can help 19
0%
10%
20%
30%
40%
50%
60%
70%
80%
DDoS Traffic hijacking Address spoofing Availability Blacklisting
57%
74%
57%
46%
28%
Internet Security Concerns
And Enterprises are Willing to Pay for MANRS
Significant value on security posture
— Median premium of 15%
— 13% would only choose MANRS
compliant providers
20
0
10
20
30
40
50
60
70
no 5% more 10% 15% 20% 25% I would only
choose a
MANRS
Compliant
services
Q: Would you pay a premium for MANRS compliant services?
Service Provider motivations are misaligned with Enterprise
perception
No one mentioned customer demands as a
reason
21
0%
5%
10%
15%
20%
25%
30%
35%
40%
Being a good
internet citizen
Being more
secure
Increasing
operating
efficiency
Regulatory
compliance
16%
36%
12%
36%
Reasons for Implementation
Q: Which aspect of MANRS would provide the greatest reason for implementing for your
organization?
What We Learned from the Study
Security is Vital to Enterprises
• MANRS knowledge is low, but MANRS attributes are highly valued
• Enterprises are willing to put MANRS compliance into RFPs and require it of their
service providers
MANRS Adds Value for Service Providers
• Service providers can differentiate from their competitors; Identifiable value in a
vague market
• Service providers may be able to add additional revenue streams based on
information security feeds and other add-on services
• MANRS compliance may reduce customer churn
22
Why SERVICE PROVIDERS Should Join MANRS
• MANRS is a sign of security proficiency and commitment
• MANRS is one indication that a provider is contributing to solving network
problems at a global scale
• MANRS distinction can add competitive value and enhance operational
effectiveness
• Enterprises indicate willingness to pay more for partnering with a provider with
high security posture
23
Why ENTERPRISES Should Require MANRS
• MANRS communicates an enterprise’s security investment to its customers
• Larger enterprises with peering arrangements that involve BGP can
incorporate the MANRS actions into IT operations, which can add maturity
and increase operational efficiency
• Enterprises can require MANRS compliance in RFPs, tender, and purchasing
processes
• In regulated industries, MANRS can be an additional factor for auditors to
consider when assessing the overall security posture of an organization
24
Commit to Routing Security,
Collaborative Action, and the Good of the
Internet
Join MANRS Today
25
Can you stand up publicly and say:
- I care about routing security
- I am prepared to spend resources on it
- I am prepared to be held accountable by the
community
Join Us
26
Visit www.manrs.org/signup
• Fill out the form with as much detail as
possible.
• We may ask questions and run tests
Get Involved in the Community
• Members support the initiative and
implement the actions in their own
networks
• Members maintain and improve the
document and promote MANRS objectives
MANRS Implementation Guide
• Providing guidance to implement MANRS principles
• Based on Best Current Operational Practices deployed by
network operators around the world
• http://www.routingmanifesto.org/bcop/
27
What’s Next: MANRS IXP Partnership Programme
There is synergy between MANRS and IXPs
— IXPs form a community with a common operational objective
— MANRS is a reference point with a global presence – useful for building a “safe neighborhood”
How can IXPs contribute?
— Technical measures: Route Server with validation, alerting on unwanted traffic, providing debugging and
monitoring tools
— Social measures: MANRS ambassador role, local audit as part of the on-boarding process
— A development team is working on a set of useful actions
28
What’s Next: MANRS Training and Certification
Routing security is hard. How can we make it more accessible? The “simple” MANRS
Implementation Guide turned into a 50-page document that assumes a certain level of expertise.
Online training modules
— Based on the MANRS Implementation Guide
— Walks a student through the tutorial with a test at the end
— Working with and looking for partners that are interested in integrating it in their curricula
A hands-on lab to achieve MANRS certification
— Completing the online modules as a first step in MANRS certification
— Looking for partners
29
30
LEARN MORE:
www.manrs.org
Visit us at
www.internetsociety.org
Follow us
@internetsociety
Galerie Jean-Malbuisson 15,
CH-1204 Geneva,
Switzerland.
+41 22 807 1444
1775 Wiehle Avenue,
Suite 201, Reston, VA
20190-5108 USA.
+1 703 439 2120
Thank you.
Andrei Robachevsky
robachevsky@isoc.org
31

More Related Content

What's hot

ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
Deploy360 Programme (Internet Society)
 
ION Islamabad - What's Happening at the IETF?
ION Islamabad - What's Happening at the IETF?ION Islamabad - What's Happening at the IETF?
ION Islamabad - What's Happening at the IETF?
Deploy360 Programme (Internet Society)
 
ION Hangzhou - Keynote: Collaborative Security and an Open Internet
ION Hangzhou - Keynote: Collaborative Security and an Open InternetION Hangzhou - Keynote: Collaborative Security and an Open Internet
ION Hangzhou - Keynote: Collaborative Security and an Open Internet
Deploy360 Programme (Internet Society)
 
ION Hangzhou - Opening Remarks
ION Hangzhou - Opening RemarksION Hangzhou - Opening Remarks
ION Hangzhou - Opening Remarks
Deploy360 Programme (Internet Society)
 
PRFP-10: Cyber threats and security in the Pacific
PRFP-10: Cyber threats and security in the PacificPRFP-10: Cyber threats and security in the Pacific
PRFP-10: Cyber threats and security in the Pacific
APNIC
 
ION Belgrade - IETF Update
ION Belgrade - IETF UpdateION Belgrade - IETF Update
ION Belgrade - IETF Update
Deploy360 Programme (Internet Society)
 
ION Hangzhou - About IETF
ION Hangzhou - About IETFION Hangzhou - About IETF
ION Hangzhou - About IETF
Deploy360 Programme (Internet Society)
 
ION Malta - Closing Slides
ION Malta - Closing SlidesION Malta - Closing Slides
ION Malta - Closing Slides
Deploy360 Programme (Internet Society)
 
ION Belgrade - MANRS by Serbian Open eXchange (SOX)
ION Belgrade - MANRS by Serbian Open eXchange (SOX)ION Belgrade - MANRS by Serbian Open eXchange (SOX)
ION Belgrade - MANRS by Serbian Open eXchange (SOX)
Deploy360 Programme (Internet Society)
 
ION Hangzhou - An IETF Journey for CNNIC
ION Hangzhou - An IETF Journey for CNNICION Hangzhou - An IETF Journey for CNNIC
ION Hangzhou - An IETF Journey for CNNIC
Deploy360 Programme (Internet Society)
 
Status of IPv6 in Pakistan
Status of IPv6 in PakistanStatus of IPv6 in Pakistan
Status of IPv6 in Pakistan
Deploy360 Programme (Internet Society)
 
ION Durban - MANRS Introduction
ION Durban - MANRS IntroductionION Durban - MANRS Introduction
ION Durban - MANRS Introduction
Deploy360 Programme (Internet Society)
 
ION Islamabad - IPv6 - Delegations, Deployments and Trends
ION Islamabad - IPv6 - Delegations, Deployments and TrendsION Islamabad - IPv6 - Delegations, Deployments and Trends
ION Islamabad - IPv6 - Delegations, Deployments and Trends
Deploy360 Programme (Internet Society)
 
Collective responsibility for security and resilience of the global routing s...
Collective responsibility for security and resilience of the global routing s...Collective responsibility for security and resilience of the global routing s...
Collective responsibility for security and resilience of the global routing s...
APNIC
 
APNIC update PNG IXP Inauguration
APNIC update PNG IXP InaugurationAPNIC update PNG IXP Inauguration
APNIC update PNG IXP Inauguration
APNIC
 
Tech 2 Tech IPv6 presentation
Tech 2 Tech IPv6 presentationTech 2 Tech IPv6 presentation
Tech 2 Tech IPv6 presentation
Jisc
 
Cyber Security Week 2015: Get involved and contribute
Cyber Security Week 2015: Get involved and contributeCyber Security Week 2015: Get involved and contribute
Cyber Security Week 2015: Get involved and contribute
APNIC
 
ION Cape Town - Opening Remarks
ION Cape Town - Opening RemarksION Cape Town - Opening Remarks
ION Cape Town - Opening Remarks
Deploy360 Programme (Internet Society)
 
ION Durban - What's Happening at the IETF?
ION Durban - What's Happening at the IETF?ION Durban - What's Happening at the IETF?
ION Durban - What's Happening at the IETF?
Deploy360 Programme (Internet Society)
 
NTT-CERT Activities by Yoshiki Sugiura [APRICOT 2015]
NTT-CERT Activities by Yoshiki Sugiura [APRICOT 2015]NTT-CERT Activities by Yoshiki Sugiura [APRICOT 2015]
NTT-CERT Activities by Yoshiki Sugiura [APRICOT 2015]
APNIC
 

What's hot (20)

ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
 
ION Islamabad - What's Happening at the IETF?
ION Islamabad - What's Happening at the IETF?ION Islamabad - What's Happening at the IETF?
ION Islamabad - What's Happening at the IETF?
 
ION Hangzhou - Keynote: Collaborative Security and an Open Internet
ION Hangzhou - Keynote: Collaborative Security and an Open InternetION Hangzhou - Keynote: Collaborative Security and an Open Internet
ION Hangzhou - Keynote: Collaborative Security and an Open Internet
 
ION Hangzhou - Opening Remarks
ION Hangzhou - Opening RemarksION Hangzhou - Opening Remarks
ION Hangzhou - Opening Remarks
 
PRFP-10: Cyber threats and security in the Pacific
PRFP-10: Cyber threats and security in the PacificPRFP-10: Cyber threats and security in the Pacific
PRFP-10: Cyber threats and security in the Pacific
 
ION Belgrade - IETF Update
ION Belgrade - IETF UpdateION Belgrade - IETF Update
ION Belgrade - IETF Update
 
ION Hangzhou - About IETF
ION Hangzhou - About IETFION Hangzhou - About IETF
ION Hangzhou - About IETF
 
ION Malta - Closing Slides
ION Malta - Closing SlidesION Malta - Closing Slides
ION Malta - Closing Slides
 
ION Belgrade - MANRS by Serbian Open eXchange (SOX)
ION Belgrade - MANRS by Serbian Open eXchange (SOX)ION Belgrade - MANRS by Serbian Open eXchange (SOX)
ION Belgrade - MANRS by Serbian Open eXchange (SOX)
 
ION Hangzhou - An IETF Journey for CNNIC
ION Hangzhou - An IETF Journey for CNNICION Hangzhou - An IETF Journey for CNNIC
ION Hangzhou - An IETF Journey for CNNIC
 
Status of IPv6 in Pakistan
Status of IPv6 in PakistanStatus of IPv6 in Pakistan
Status of IPv6 in Pakistan
 
ION Durban - MANRS Introduction
ION Durban - MANRS IntroductionION Durban - MANRS Introduction
ION Durban - MANRS Introduction
 
ION Islamabad - IPv6 - Delegations, Deployments and Trends
ION Islamabad - IPv6 - Delegations, Deployments and TrendsION Islamabad - IPv6 - Delegations, Deployments and Trends
ION Islamabad - IPv6 - Delegations, Deployments and Trends
 
Collective responsibility for security and resilience of the global routing s...
Collective responsibility for security and resilience of the global routing s...Collective responsibility for security and resilience of the global routing s...
Collective responsibility for security and resilience of the global routing s...
 
APNIC update PNG IXP Inauguration
APNIC update PNG IXP InaugurationAPNIC update PNG IXP Inauguration
APNIC update PNG IXP Inauguration
 
Tech 2 Tech IPv6 presentation
Tech 2 Tech IPv6 presentationTech 2 Tech IPv6 presentation
Tech 2 Tech IPv6 presentation
 
Cyber Security Week 2015: Get involved and contribute
Cyber Security Week 2015: Get involved and contributeCyber Security Week 2015: Get involved and contribute
Cyber Security Week 2015: Get involved and contribute
 
ION Cape Town - Opening Remarks
ION Cape Town - Opening RemarksION Cape Town - Opening Remarks
ION Cape Town - Opening Remarks
 
ION Durban - What's Happening at the IETF?
ION Durban - What's Happening at the IETF?ION Durban - What's Happening at the IETF?
ION Durban - What's Happening at the IETF?
 
NTT-CERT Activities by Yoshiki Sugiura [APRICOT 2015]
NTT-CERT Activities by Yoshiki Sugiura [APRICOT 2015]NTT-CERT Activities by Yoshiki Sugiura [APRICOT 2015]
NTT-CERT Activities by Yoshiki Sugiura [APRICOT 2015]
 

Similar to ION Malta - MANRS Introduction

Two years of good MANRS
Two years of good MANRSTwo years of good MANRS
Two years of good MANRS
APNIC
 
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
Deploy360 Programme (Internet Society)
 
MANRS - Introduction to Internet Routing Security
MANRS - Introduction to Internet Routing SecurityMANRS - Introduction to Internet Routing Security
MANRS - Introduction to Internet Routing Security
Obika Gellineau
 
Improving routing security through concerted action
Improving routing security through concerted actionImproving routing security through concerted action
Improving routing security through concerted action
CSUC - Consorci de Serveis Universitaris de Catalunya
 
AusNOG - Two Years of Good MANRS
AusNOG - Two Years of Good MANRSAusNOG - Two Years of Good MANRS
AusNOG - Two Years of Good MANRS
Deploy360 Programme (Internet Society)
 
Reliable Resource Data
Reliable Resource DataReliable Resource Data
Reliable Resource Data
APNIC
 
Stephen Wallo
Stephen WalloStephen Wallo
Stephen Wallo
AFCEA International
 
Webinar connectivity vs hybrid networking
Webinar connectivity vs hybrid networkingWebinar connectivity vs hybrid networking
Webinar connectivity vs hybrid networking
Orange Business Services
 
Sify - IT Management Services
Sify - IT Management ServicesSify - IT Management Services
Sify - IT Management Serviceswebhostingguy
 
Cloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran RocheCloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran Roche
Ciaran Roche
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services
Marlabs
 
SDN & NFV: Driving Additional Value into Managed Services
SDN & NFV: Driving Additional Value into Managed ServicesSDN & NFV: Driving Additional Value into Managed Services
SDN & NFV: Driving Additional Value into Managed Services
TBI Inc.
 
Mpls vpn-business-ready-networks
Mpls vpn-business-ready-networksMpls vpn-business-ready-networks
Mpls vpn-business-ready-networks
Suvarna Vaidya
 
ITAM UK 2017_Implementing a global award winning SAM program_Jochen Hagenlocher
ITAM UK 2017_Implementing a global award winning SAM program_Jochen HagenlocherITAM UK 2017_Implementing a global award winning SAM program_Jochen Hagenlocher
ITAM UK 2017_Implementing a global award winning SAM program_Jochen Hagenlocher
Martin Thompson
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
Enterprise Management Associates
 
PLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It Together
PLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It TogetherPLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It Together
PLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It Together
PROIDEA
 
CyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT SecurityCyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT Security
Haluk Demirkan
 
“Security” In a Digital Interconnected World
“Security” In a Digital Interconnected World “Security” In a Digital Interconnected World
“Security” In a Digital Interconnected World
Internet Society
 
Bringing the Cloud Back to Earth
Bringing the Cloud Back to EarthBringing the Cloud Back to Earth
Bringing the Cloud Back to Earth
Sri Chalasani
 

Similar to ION Malta - MANRS Introduction (20)

Two years of good MANRS
Two years of good MANRSTwo years of good MANRS
Two years of good MANRS
 
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
 
MANRS - Introduction to Internet Routing Security
MANRS - Introduction to Internet Routing SecurityMANRS - Introduction to Internet Routing Security
MANRS - Introduction to Internet Routing Security
 
Improving routing security through concerted action
Improving routing security through concerted actionImproving routing security through concerted action
Improving routing security through concerted action
 
AusNOG - Two Years of Good MANRS
AusNOG - Two Years of Good MANRSAusNOG - Two Years of Good MANRS
AusNOG - Two Years of Good MANRS
 
Reliable Resource Data
Reliable Resource DataReliable Resource Data
Reliable Resource Data
 
Stephen Wallo
Stephen WalloStephen Wallo
Stephen Wallo
 
Webinar connectivity vs hybrid networking
Webinar connectivity vs hybrid networkingWebinar connectivity vs hybrid networking
Webinar connectivity vs hybrid networking
 
Sify - IT Management Services
Sify - IT Management ServicesSify - IT Management Services
Sify - IT Management Services
 
Cloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran RocheCloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran Roche
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services
 
SDN & NFV: Driving Additional Value into Managed Services
SDN & NFV: Driving Additional Value into Managed ServicesSDN & NFV: Driving Additional Value into Managed Services
SDN & NFV: Driving Additional Value into Managed Services
 
Mpls vpn-business-ready-networks
Mpls vpn-business-ready-networksMpls vpn-business-ready-networks
Mpls vpn-business-ready-networks
 
ITAM UK 2017_Implementing a global award winning SAM program_Jochen Hagenlocher
ITAM UK 2017_Implementing a global award winning SAM program_Jochen HagenlocherITAM UK 2017_Implementing a global award winning SAM program_Jochen Hagenlocher
ITAM UK 2017_Implementing a global award winning SAM program_Jochen Hagenlocher
 
Losing Control to the Cloud
Losing Control to the CloudLosing Control to the Cloud
Losing Control to the Cloud
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
 
PLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It Together
PLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It TogetherPLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It Together
PLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It Together
 
CyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT SecurityCyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT Security
 
“Security” In a Digital Interconnected World
“Security” In a Digital Interconnected World “Security” In a Digital Interconnected World
“Security” In a Digital Interconnected World
 
Bringing the Cloud Back to Earth
Bringing the Cloud Back to EarthBringing the Cloud Back to Earth
Bringing the Cloud Back to Earth
 

More from Deploy360 Programme (Internet Society)

ION Belgrade - Jordi Palet Martinez IPv6 Success Stories
ION Belgrade - Jordi Palet Martinez IPv6 Success StoriesION Belgrade - Jordi Palet Martinez IPv6 Success Stories
ION Belgrade - Jordi Palet Martinez IPv6 Success Stories
Deploy360 Programme (Internet Society)
 
ION Belgrade - ISOC Serbia Belgrade Chapter Presentation
ION Belgrade - ISOC Serbia Belgrade Chapter PresentationION Belgrade - ISOC Serbia Belgrade Chapter Presentation
ION Belgrade - ISOC Serbia Belgrade Chapter Presentation
Deploy360 Programme (Internet Society)
 
ION Belgrade - Opening Slides
ION Belgrade - Opening SlidesION Belgrade - Opening Slides
ION Belgrade - Opening Slides
Deploy360 Programme (Internet Society)
 
ION Belgrade - Closing Slides
ION Belgrade - Closing SlidesION Belgrade - Closing Slides
ION Belgrade - Closing Slides
Deploy360 Programme (Internet Society)
 
ION Malta - Seeweb Why MANRS is good for you
ION Malta - Seeweb Why MANRS is good for youION Malta - Seeweb Why MANRS is good for you
ION Malta - Seeweb Why MANRS is good for you
Deploy360 Programme (Internet Society)
 
ION Durban - How peering behaviour affects growth of the internet
ION Durban - How peering behaviour affects growth of the internetION Durban - How peering behaviour affects growth of the internet
ION Durban - How peering behaviour affects growth of the internet
Deploy360 Programme (Internet Society)
 
ION Durban - Introduction to ISOC Gauteng Chapter
ION Durban - Introduction to ISOC Gauteng ChapterION Durban - Introduction to ISOC Gauteng Chapter
ION Durban - Introduction to ISOC Gauteng Chapter
Deploy360 Programme (Internet Society)
 
ION Durban - NAT64/DNS64 Experiments and the NAT64Check Tool
ION Durban - NAT64/DNS64 Experiments and the NAT64Check ToolION Durban - NAT64/DNS64 Experiments and the NAT64Check Tool
ION Durban - NAT64/DNS64 Experiments and the NAT64Check Tool
Deploy360 Programme (Internet Society)
 
ION Durban - Closing Slides
ION Durban - Closing SlidesION Durban - Closing Slides
ION Durban - Closing Slides
Deploy360 Programme (Internet Society)
 
ION Durban - DNSSEC, and Why We Can't Avoid It
ION Durban - DNSSEC, and Why We Can't Avoid ItION Durban - DNSSEC, and Why We Can't Avoid It
ION Durban - DNSSEC, and Why We Can't Avoid It
Deploy360 Programme (Internet Society)
 
ION Durban - IPv6 Case Study (Liquid Telecom)
ION Durban - IPv6 Case Study (Liquid Telecom)ION Durban - IPv6 Case Study (Liquid Telecom)
ION Durban - IPv6 Case Study (Liquid Telecom)
Deploy360 Programme (Internet Society)
 
ION Durban - Opening Slides
ION Durban - Opening SlidesION Durban - Opening Slides
ION Durban - Opening Slides
Deploy360 Programme (Internet Society)
 
ION Costa Rica - About the IETF and How to Get Involved
ION Costa Rica - About the IETF and How to Get InvolvedION Costa Rica - About the IETF and How to Get Involved
ION Costa Rica - About the IETF and How to Get Involved
Deploy360 Programme (Internet Society)
 
ION Costa Rica - Closing Slides
ION Costa Rica - Closing SlidesION Costa Rica - Closing Slides
ION Costa Rica - Closing Slides
Deploy360 Programme (Internet Society)
 
ION Costa Rica - Validacion en el origen
ION Costa Rica - Validacion en el origenION Costa Rica - Validacion en el origen
ION Costa Rica - Validacion en el origen
Deploy360 Programme (Internet Society)
 
ION Costa Rica - Setting the Scene: IPv6 Deployment in Costa Rica and Latin A...
ION Costa Rica - Setting the Scene: IPv6 Deployment in Costa Rica and Latin A...ION Costa Rica - Setting the Scene: IPv6 Deployment in Costa Rica and Latin A...
ION Costa Rica - Setting the Scene: IPv6 Deployment in Costa Rica and Latin A...
Deploy360 Programme (Internet Society)
 

More from Deploy360 Programme (Internet Society) (16)

ION Belgrade - Jordi Palet Martinez IPv6 Success Stories
ION Belgrade - Jordi Palet Martinez IPv6 Success StoriesION Belgrade - Jordi Palet Martinez IPv6 Success Stories
ION Belgrade - Jordi Palet Martinez IPv6 Success Stories
 
ION Belgrade - ISOC Serbia Belgrade Chapter Presentation
ION Belgrade - ISOC Serbia Belgrade Chapter PresentationION Belgrade - ISOC Serbia Belgrade Chapter Presentation
ION Belgrade - ISOC Serbia Belgrade Chapter Presentation
 
ION Belgrade - Opening Slides
ION Belgrade - Opening SlidesION Belgrade - Opening Slides
ION Belgrade - Opening Slides
 
ION Belgrade - Closing Slides
ION Belgrade - Closing SlidesION Belgrade - Closing Slides
ION Belgrade - Closing Slides
 
ION Malta - Seeweb Why MANRS is good for you
ION Malta - Seeweb Why MANRS is good for youION Malta - Seeweb Why MANRS is good for you
ION Malta - Seeweb Why MANRS is good for you
 
ION Durban - How peering behaviour affects growth of the internet
ION Durban - How peering behaviour affects growth of the internetION Durban - How peering behaviour affects growth of the internet
ION Durban - How peering behaviour affects growth of the internet
 
ION Durban - Introduction to ISOC Gauteng Chapter
ION Durban - Introduction to ISOC Gauteng ChapterION Durban - Introduction to ISOC Gauteng Chapter
ION Durban - Introduction to ISOC Gauteng Chapter
 
ION Durban - NAT64/DNS64 Experiments and the NAT64Check Tool
ION Durban - NAT64/DNS64 Experiments and the NAT64Check ToolION Durban - NAT64/DNS64 Experiments and the NAT64Check Tool
ION Durban - NAT64/DNS64 Experiments and the NAT64Check Tool
 
ION Durban - Closing Slides
ION Durban - Closing SlidesION Durban - Closing Slides
ION Durban - Closing Slides
 
ION Durban - DNSSEC, and Why We Can't Avoid It
ION Durban - DNSSEC, and Why We Can't Avoid ItION Durban - DNSSEC, and Why We Can't Avoid It
ION Durban - DNSSEC, and Why We Can't Avoid It
 
ION Durban - IPv6 Case Study (Liquid Telecom)
ION Durban - IPv6 Case Study (Liquid Telecom)ION Durban - IPv6 Case Study (Liquid Telecom)
ION Durban - IPv6 Case Study (Liquid Telecom)
 
ION Durban - Opening Slides
ION Durban - Opening SlidesION Durban - Opening Slides
ION Durban - Opening Slides
 
ION Costa Rica - About the IETF and How to Get Involved
ION Costa Rica - About the IETF and How to Get InvolvedION Costa Rica - About the IETF and How to Get Involved
ION Costa Rica - About the IETF and How to Get Involved
 
ION Costa Rica - Closing Slides
ION Costa Rica - Closing SlidesION Costa Rica - Closing Slides
ION Costa Rica - Closing Slides
 
ION Costa Rica - Validacion en el origen
ION Costa Rica - Validacion en el origenION Costa Rica - Validacion en el origen
ION Costa Rica - Validacion en el origen
 
ION Costa Rica - Setting the Scene: IPv6 Deployment in Costa Rica and Latin A...
ION Costa Rica - Setting the Scene: IPv6 Deployment in Costa Rica and Latin A...ION Costa Rica - Setting the Scene: IPv6 Deployment in Costa Rica and Latin A...
ION Costa Rica - Setting the Scene: IPv6 Deployment in Costa Rica and Latin A...
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

ION Malta - MANRS Introduction

  • 1. Internet Society © 1992–2016 MANRS - Mutually Agreed Norms for Routing Security A business case for routing security Kevin Meynell meynell@isoc.org 18 September 2017 Presentation title – Client name 1
  • 2. What do a healthy lifestyle and security management have in common? 2
  • 3. A Routing Security Primer The Problem 3
  • 4. Routing Basics Routers use Border Gateway Protocol (BGP) to exchange “reachability information” - networks they know how to reach Routers build a “routing table” and pick the best route when sending a packet, typically based on the shortest path. When talking BGP routers use an Autonomous System Numbers (ASN) uniquely identifying their network Almost 60,000 networks (Autonomous Systems) across the Internet 4
  • 5. The Problem Caption 10/12pt Caption body copy 5 Border Gateway Protocol (BGP) is based on trust • No built-in validation of the legitimacy of updates • The chain of trust spans continents • Lack of reliable resource data
  • 7. No Day Without an Incident 7 http://bgpstream.com/
  • 8. What’s Happening? IP prefix hijack • AS announces prefix it doesn’t originate and wins the “best route” selection • AS announces more specific prefix than what may be announced by originating AS • AS announces it can route traffic through shorter route, whether it exists or not • Packets end up being forwarded to wrong part of Internet • Denial-of-Service (DoS), traffic interception, or impersonating network or service Route leaks • Violation of valley-free routing (e.g. re-announcing transit provider routes to another provider) • Usually due to misconfigurations, but can be used for traffic inspection and reconnaissance • Can be equally devastating IP address spoofing • Creation of IP packets with false source address • The root cause of reflection DDoS attacks 8
  • 9. Are There Solutions? 9 Yes! Prefix and AS-PATH filtering, RPKI, IRR, … BGPSEC under development at the IETF Whois, Routing Registries and Peering databases But… • Lack of deployment • Lack of reliable data
  • 10. A Tragedy of the Commons 10 From a routing perspective, securing your own network does not necessarily make it more secure. Network security is in someone else’s hands. — The more hands – the better the security Is there a clear, visible, and industry- supported line between good and bad? — A cultural norm?
  • 11. A vital part of the security solution MANRS Mutually Agreed Norms for Routing Security 11
  • 12. MANRS was founded with the ambitious goal of improving the security and reliability of the global Internet routing system, based on collaboration among participants and shared responsibility for Internet infrastructure. 12
  • 13. Mutually Agreed Norms for Routing Security 13 MANRS defines four concrete actions that network operators should implement — Technology-neutral baseline for global adoption — A minimum set of requirements MANRS builds a visible community of security- minded operators — Promotes culture of collaborative responsibility
  • 14. MANRS Actions Filtering – Prevent propagation of incorrect routing information • Ensure the correctness of your own announcements and announcements from your customers to adjacent networks with prefix and AS-path granularity Anti-spoofing – Prevent traffic with spoofed source IP addresses • Enable source address validation for at least single-homed stub customer networks, their own end- users, and infrastructure Coordination – Facilitate global operational communication and coordination between network operators • Maintain globally accessible up-to-date contact information Global Validation – Facilitate validation of routing information on a global scale • Publish your data, so others can validate 14
  • 15. A Note on MANRS’ Limitations 15 MANRS is an absolute minimum an operator should consider, with low risk and cost-effective Actions The more operators implement MANRS, the fewer routing incidents we will see, and the smaller will be their scope MANRS is not a one-stop solution to all of the internet’s routing woes, but it is an important step toward a globally robust and secure routing infrastructure
  • 16. A study with 451 Research So what is the business case for MANRS? (and routing security) 16
  • 17. Questionnaire-based study — Assessment against existing 451 Research data — Common perception elements Service providers — Initial targeting interviews – Global demographic — 25 telephone interviews Enterprise Internet teams — 250 web questionnaires — 1,000 employee minimum — Primarily North America 17 14% 14% 11% 10%10% 8% 8% 6% 19% Enterprise Demographics Manufacturing Professional Services Retail Telecommunications Health Financial Insurance Construction Other Comprehensive Research Study
  • 18. Enterprises Are Concerned About Security A core value for a majority Smaller enterprises had an outsized concern about security as part of their primary values 18 0% 10% 20% 30% 40% 50% 1000 - 2499 2500 - 4999 5000 - 9999 10,000 + Primary Core Value Part of Our Values Not Distinguishing
  • 19. Enterprise Concerns Around Security — Widely varying concerns across a range of issues — Security focus is aligned with type of issues MANRS is looking to address And confidence that MANRS can help 19 0% 10% 20% 30% 40% 50% 60% 70% 80% DDoS Traffic hijacking Address spoofing Availability Blacklisting 57% 74% 57% 46% 28% Internet Security Concerns
  • 20. And Enterprises are Willing to Pay for MANRS Significant value on security posture — Median premium of 15% — 13% would only choose MANRS compliant providers 20 0 10 20 30 40 50 60 70 no 5% more 10% 15% 20% 25% I would only choose a MANRS Compliant services Q: Would you pay a premium for MANRS compliant services?
  • 21. Service Provider motivations are misaligned with Enterprise perception No one mentioned customer demands as a reason 21 0% 5% 10% 15% 20% 25% 30% 35% 40% Being a good internet citizen Being more secure Increasing operating efficiency Regulatory compliance 16% 36% 12% 36% Reasons for Implementation Q: Which aspect of MANRS would provide the greatest reason for implementing for your organization?
  • 22. What We Learned from the Study Security is Vital to Enterprises • MANRS knowledge is low, but MANRS attributes are highly valued • Enterprises are willing to put MANRS compliance into RFPs and require it of their service providers MANRS Adds Value for Service Providers • Service providers can differentiate from their competitors; Identifiable value in a vague market • Service providers may be able to add additional revenue streams based on information security feeds and other add-on services • MANRS compliance may reduce customer churn 22
  • 23. Why SERVICE PROVIDERS Should Join MANRS • MANRS is a sign of security proficiency and commitment • MANRS is one indication that a provider is contributing to solving network problems at a global scale • MANRS distinction can add competitive value and enhance operational effectiveness • Enterprises indicate willingness to pay more for partnering with a provider with high security posture 23
  • 24. Why ENTERPRISES Should Require MANRS • MANRS communicates an enterprise’s security investment to its customers • Larger enterprises with peering arrangements that involve BGP can incorporate the MANRS actions into IT operations, which can add maturity and increase operational efficiency • Enterprises can require MANRS compliance in RFPs, tender, and purchasing processes • In regulated industries, MANRS can be an additional factor for auditors to consider when assessing the overall security posture of an organization 24
  • 25. Commit to Routing Security, Collaborative Action, and the Good of the Internet Join MANRS Today 25 Can you stand up publicly and say: - I care about routing security - I am prepared to spend resources on it - I am prepared to be held accountable by the community
  • 26. Join Us 26 Visit www.manrs.org/signup • Fill out the form with as much detail as possible. • We may ask questions and run tests Get Involved in the Community • Members support the initiative and implement the actions in their own networks • Members maintain and improve the document and promote MANRS objectives
  • 27. MANRS Implementation Guide • Providing guidance to implement MANRS principles • Based on Best Current Operational Practices deployed by network operators around the world • http://www.routingmanifesto.org/bcop/ 27
  • 28. What’s Next: MANRS IXP Partnership Programme There is synergy between MANRS and IXPs — IXPs form a community with a common operational objective — MANRS is a reference point with a global presence – useful for building a “safe neighborhood” How can IXPs contribute? — Technical measures: Route Server with validation, alerting on unwanted traffic, providing debugging and monitoring tools — Social measures: MANRS ambassador role, local audit as part of the on-boarding process — A development team is working on a set of useful actions 28
  • 29. What’s Next: MANRS Training and Certification Routing security is hard. How can we make it more accessible? The “simple” MANRS Implementation Guide turned into a 50-page document that assumes a certain level of expertise. Online training modules — Based on the MANRS Implementation Guide — Walks a student through the tutorial with a test at the end — Working with and looking for partners that are interested in integrating it in their curricula A hands-on lab to achieve MANRS certification — Completing the online modules as a first step in MANRS certification — Looking for partners 29
  • 31. Visit us at www.internetsociety.org Follow us @internetsociety Galerie Jean-Malbuisson 15, CH-1204 Geneva, Switzerland. +41 22 807 1444 1775 Wiehle Avenue, Suite 201, Reston, VA 20190-5108 USA. +1 703 439 2120 Thank you. Andrei Robachevsky robachevsky@isoc.org 31

Editor's Notes

  1. What’s the commonality between a healthy lifestyle and security management? They both sound good in theory –everyone wants to be healthy - but in the short term you don’t feel any better after eating a cup of broccoli. Skipping the the cake - or spending resources on security management - does not visibly make any difference. At least in short term. We all know someone who lived a long life despite an unhealthy lifestyle, or a company that never got attacked or hacked.  It takes years of healthy choices to make, and see, a difference.
  2. Plenty of evidence