+ All Categories
Home > Technology > CTO-CybersecurityForum-2010-John Crain

CTO-CybersecurityForum-2010-John Crain

Date post: 30-May-2015
Category:
Upload: segughana
View: 320 times
Download: 2 times
Share this document with a friend
Popular Tags:
15
Global DNS CERT Business case for collabora/on in security
Transcript
Page 1: CTO-CybersecurityForum-2010-John Crain

Global DNS���CERT

Business  case  for  collabora/on  in  security  

Page 2: CTO-CybersecurityForum-2010-John Crain

Background

•  Growing  risks  to  DNS  security  and  resiliency  – Emergence  of  Conficker.  – Growing  number  of  domain  hijacking  cases  

•  Community  calls  for  systemic  DNS  security  planning  and  response  

•  ICANN  commitments  under  Affirma/on  of  Commitments  

•  Ini/a/ves  called  for  in  ICANN  2010-­‐2013  Strategic  Plan  

Page 3: CTO-CybersecurityForum-2010-John Crain

Objectives of threats to DNS

•  Politically-motivated disruption of DNS •  Desire for financial gain •  Demonstration of technical superiority •  Gratuitous defacement or damage

Source: 2009 Information Technology Sector Baseline Risk Assessment, US Dept of Homeland Security

Page 4: CTO-CybersecurityForum-2010-John Crain

Potential impacts

•  Long lasting damage to “Trust” in system •  Significant and lasting economic harm •  Is the Internet as we know it at Risk from

malicious behavior?

Page 5: CTO-CybersecurityForum-2010-John Crain

Lessons learned

•  Conficker (’08- ) –  DNS played a role in slowing Conficker –  Complex interactions with DNS community –  Resource-intensive response activity���

•  Conficker WG noted need for a dedicated incident response capability

Page 6: CTO-CybersecurityForum-2010-John Crain

Lessons learned

•  Protocol vulnerability (’08) –  Fast response, but –  Predicated on ability to ���

find “key people”

•  A coordination center would have improved situational awareness

Diagram of cache poisoning attack

Page 7: CTO-CybersecurityForum-2010-John Crain

Lessons learned

•  Avalanche (’08- ) –  Targets financial sector –  Exploits the limited���

resources of registrars –  Trend continues upward

•  Complex coordination requires dedicated team

Page 8: CTO-CybersecurityForum-2010-John Crain

hLp://www.icann.org/en/topics/ssr/dns-­‐cert-­‐business-­‐case-­‐10feb10-­‐

en.pdf  

Maybe a DNS-CERT?

Page 9: CTO-CybersecurityForum-2010-John Crain

Mission of DNS CERT

“Ensure   DNS   operators   and   suppor/ng  organiza/ons   have   a   security   coordina-­‐/on  center   with   sufficient   exper/se   and  resources   to   enable   !mely   and   efficient  response  to  threats  to  the  security,  stability  and  resiliency  of  the  DNS”

Page 10: CTO-CybersecurityForum-2010-John Crain

Goals

•  Validate need for standing collaborative response capability to address systemic threats/risks –  Full-time/global; coordinate existing capabilities; serve

all stakeholders especially less resourced operators

•  Operational focus determined in engagement with stakeholders and leveraging existing efforts –  Fostering situational awareness; incident response

assistance/coordination;

Page 11: CTO-CybersecurityForum-2010-John Crain

Stakeholders by role

Page 12: CTO-CybersecurityForum-2010-John Crain

Participation and feedback

•  DNS CERT must respond to constituency needs

•  Participation by key constituents –  Adds capability to CERT –  Extends its geographic reach –  Helps keep focus on constituency needs

Page 13: CTO-CybersecurityForum-2010-John Crain

Open questions include:

•  Where should it be housed? •  What is best model? •  How should it be funded? •  Etc. etc.

Page 14: CTO-CybersecurityForum-2010-John Crain

Way Forward

•  This is a “proposal” we need feedback! •  Seek community feedback – Email [email protected] with comments

Page 15: CTO-CybersecurityForum-2010-John Crain

Thank you

John Crain Senior Director, SSR ICANN

[email protected]


Recommended