White House Road Map Provides Guidance on BGP Internet Routing Security

A new federal road map on internet routing addresses a Border Gateway Protocol (BGP) vulnerability and provides tips on how to improve internet routing security.

1 Min Read
a digital padlock and the words network security
Alamy

At a Glance

  • The road map targets BGP vulnerabilities to improve internet routing security and prevent data theft, outages, and espionage.
  • The report advocates for adopting RPKI and ROA and recommends risk-based planning and monitoring.
  • The Biden administration will create a public-private working group to develop ways to implement the road map.

Last week, the White House Office of the National Cyber Director (ONCD) unveiled a Road Map to Enhancing Internet Routing Security to provide guidance on how to address a security vulnerability related to the Border Gateway Protocol (BGP), which is a key part of how data flows across the internet.

BGP consists of rules on the best routes for information to be transmitted on the internet across private, public, corporate, and government networks. BGP operates using peers, which perform route discovery, route storage, and path selection. Entities that use BGP include cloud providers, internet service providers, universities, energy companies, and large enterprises.

When internet traffic gets improperly diverted, either intentionally or inadvertently, that could lead to theft, extortion, state-level espionage, and failure of critical infrastructure, the ONCD said.

“Securing BGP is essential to safeguarding the integrity of our digital infrastructure,” Cybersecurity and Infrastructure Security Agency Director Jen Easterly said in a statement. “Through strong partnerships—both with industry and with government agencies—we can enhance the resilience of our internet routing, ensuring a secure and reliable internet for our nation.”

BGP predates the public internet, explains Will Townsend, vice president and principal analyst at Moor Insights & Strategy.

Related:Securing Linux Systems with eBPF: The Future of In-Kernel Observability and Security

Continue Reading This Article on Network Computing

Read more about:

Network Computing

About the Authors

Network Computing

Network Computing, a sister site to ITPro Today, provides community members with in-depth analysis on new and emerging infrastructure technologies, real-world advice on implementation and operations, and practical strategies for improving their skills and advancing their careers. Its community is a trusted resource for IT architects and engineers who must understand business requirements as well as build and manage the infrastructures to meet those needs.

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like