October 15, 2024 By Sue Poremba 2 min read

The Biden-Harris Administration has taken another step toward improving the nation’s cybersecurity. In September, the White House Office of the National Cyber Director (ONCD) announced it was putting policies in place to address a key security vulnerability associated with the Border Gateway Protocol (BGP).

BGP is a set of rules that helps the internet work by selecting the best route for data to travel between networks. It is a fundamental protocol that allows networks to communicate with each other. However, it is susceptible to misconfigurations that lead to exploits by malicious actors.

“Securing BGP is essential to safeguarding the integrity of our digital infrastructure. Through strong partnerships — both with industry and with government agencies — we can enhance the resilience of our internet routing, ensuring a secure and reliable internet for our nation,” said CISA Director Jen Easterly, in a statement announcing the Roadmap to Enhancing Internet Routing Security.

The need to address security in BGP

The interconnectedness of the internet and cloud computing means that an outage or a software exploit for one company could snowball to other organizations. It’s what happened with a Cloudflare outage five years ago. When Cloudflare was impacted by a bad software deployment, its customers were also impacted by the problem, all because of the connected relationships through BGP.

ONCD, in collaboration with CISA, recommended actions designed to apply to all network types, meaning all network service providers and entities that operate enterprise networks or hold their own IP address resources. They are, briefly:

  • Risk-based planning
  • ROA publication
  • Contracting requirements
  • Monitoring
  • Understanding the basic problem of BGP

Let’s use an analogy, said Stuart Madnick, Professor of Information Technology at the MIT Sloan School of Management, in email commentary. Consider your car’s GPS. It indicates which roads are crowded (usually shown in red) and tries to route you around them.

But how does your GPS know which roads are crowded? It relies on information from various sources — what if these sources are lying?

“The internet operates the same way,” explained Madnick. “The internet uses various sources to route its traffic, including gateways. In simple terms, the gateways provide traffic information such as ‘the way to get to Boston is to take this road — I am the gateway.’”

It’s a problem in internet architecture because internet traffic could then be routed to places where it might be intercepted or modified. “This has actually happened a couple of times in the past, though it was claimed to be an accident,” said Madnick.

What is groundbreaking about the roadmap

The internet (and its predecessors) were based on the notion that all its components were cooperative and trustworthy. To the extent that these assumptions need to change, it is a “game changer.”

“I have not studied the details of the proposal, but it will likely change the nature of the internet as we know it,” said Madnick. “Just as China has prevented the free flow of internet traffic in and out of its country, this could further fragment the internet or reduce its efficiency and resiliency. The outcomes are likely not well understood in advance, and possible unintended consequences could result.”

As for the White House, the goals are clear.

“Internet routing security is a vital part of network security that, when overlooked, can lead to loss of service, theft of data and other malicious attacks,” Assistant Secretary of Commerce for Communications and Information and NTIA Administrator Alan Davidson, said in a formal statement. “ONCD’s roadmap is an important step towards helping the entire internet ecosystem protect users from these threats.”

More from News

FBI, CISA issue warning for cross Apple-Android texting

3 min read - CISA and the FBI recently released a joint statement that the People's Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, with best practices organizations and agencies should adopt to protect against this espionage threat. According to the statement, PRC-affiliated actors compromised networks at multiple telecommunication companies. They stole customer call records data as well…

Zero-day exploits underscore rising risks for internet-facing interfaces

3 min read - Recent reports confirm the active exploitation of a critical zero-day vulnerability targeting Palo Alto Networks’ Next-Generation Firewalls (NGFW) management interfaces. While Palo Alto’s swift advisories and mitigation guidance offer a starting point for remediation, the broader implications of such vulnerabilities demand attention from organizations globally. The surge in attacks on internet-facing management interfaces highlights an evolving threat landscape and necessitates rethinking how organizations secure critical assets. Who is exploiting the NGFW zero-day? As of now, little is known about the…

Will arresting the National Public Data threat actor make a difference?

3 min read - The arrest of USDoD, the mastermind behind the colossal National Public Data breach, was a victory for law enforcement. It also raises some fundamental questions. Do arrests and takedowns truly deter cyberattacks? Or do they merely mark the end of one criminal’s chapter while others rise to take their place? As authorities continue to crack down on cyber criminals, the arrest of high-profile threat actors like USDoD reveals a deeper, more complex reality about the state of global cyber crime.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today