Explore Legal.io

For Clients
Legal.io company logo
Hire Talent
Find the best fit for any legal role
For Members
Jobs
The best legal jobs, updated daily
Salaries
Benchmark compensation for any legal role
Learn
Learn and grow with our community
Events
Connect with peers at exclusive events
Apps
Tools to streamline legal work
Advertise on Legal.io
Post a job for free
Reach more qualified applicants quickly
Advertise with Us
Reach a targeted audience

For Clients

Hire Talent
Legal.io company logo
Solutions
Find the best fit for any legal role
New Hire
Get highly qualified candidates in days
Popular Roles
Data & Tools
Budget Calculator
Plan and manage your legal budget
Salary Insights
Compensation data for legal roles
Vendor Directory
The ultimate list of legal tech tools

FCC Proposes Rules to Strengthen BGP Security

The FCC has issued a Notice of Proposed Rulemaking to address security vulnerabilities in the Border Gateway Protocol (BGP), requiring large broadband providers to develop comprehensive BGP Risk Management Plans and submit detailed quarterly reports.

FCC Proposes Rules to Strengthen BGP Security

The Federal Communications Commission (FCC) issued a Notice of Proposed Rulemaking (NPRM) earlier this month. This notice is aimed at addressing some of the more significant security vulnerabilities in the Border Gateway Protocol (BGP), the foundational technology that routes internet traffic between networks.

This proposal pushes for retail broadband internet providers to develop and maintain comprehensive plans to mitigate any vulnerabilities. Doing this will enhance the overall security of internet traffic routing.

The FCC is the authority in charge of regulating this aspect of internet infrastructure and to make sure it is rooted in its recent classification of retail broadband internet access as a "telecommunications service,". This classification brings it within the scope of the FCCs regulatory jurisdiction.

Background on BGP and Its Vulnerabilities

The modern internet architecture available consists of numerous interconnected networks known as Autonomous Systems (ASes). These systems are designed to rely on routers to direct traffic, using routing tables to determine the optimal paths for data to travel.

Here is where BGP comes in, as it facilitates this process by enabling ASes to advertise routes they can handle, which other ASes then incorporate into their routing tables.

This decentralized and trust-based system, however, is vulnerable to misconfigurations and malicious attacks, such as BGP hijacking. If any attack is successful, there are significant disruptions, unauthorized surveillance, and data breaches, highlighting the need for robust security measures.

BGP Risk Management Plans

The NPRM requires large broadband providers to file detailed BGP Risk Management Plans with the FCC. To do this, broadband providers need to outline their strategies for implementing Resource Public Key Infrastructure (RPKI). RPKI is a cryptographic system designed to secure internet routing by verifying the legitimacy of route advertisements. The proposed BGP Plans must include:

  • Processes for creating and maintaining Route Origin Authorizations (ROAs)

  • Factors influencing the creation and maintenance of ROAs

  • Goals and timelines for ROA registrations

  • Criteria for measuring progress

  • Implementation of Route Origin Validation (ROV) filtering at interconnection points

  • Contractual requirements for upstream third parties to provide ROV filtering

While smaller providers may not be required to file these plans with the FCC, they must keep them available for inspection upon request. All BGP Plans will be treated as confidential, safeguarding the sensitive nature of the information.

Detailed Quarterly Reporting

In addition to the BGP Plans, large broadband providers must submit quarterly reports to the FCC, detailing their progress in securing internet routing. These reports will include:

  • Lists of Registry Org IDs and Autonomous System Numbers (ASNs)

  • Details of address holdings and reassignments

  • Information on IP prefixes in originated routes, including those covered by ROAs

  • The extent of ROV filtering performed for peers and customers

The FCC aims to gather data that is difficult to aggregate from public sources, ensuring comprehensive monitoring of the providers' efforts to secure internet routing.

Additional Measures and Implementation Timeline

With the risk management in check and the reports done, the NPRM is also seeking comments on: 

  • Imposing conditions on address space assignment contracts to ensure compliance with RPKI reporting

  • Setting deployment goals for RPKI implementation, proposing one year for large providers and two years for others

  • Requiring outreach and education efforts to support downstream providers

The first BGP plans are to be filed 90 days after the effective date of the rules, with quarterly reports starting 30 days after the necessary steps are concluded for the rule to take effect.

The FCC's Justification and Authority

The FCC asserts its regulatory authority based on several statutory grounds:

  • Title II and Title III of the Communications Act: These provisions empower the FCC to regulate telecommunications services, ensuring secure routing as part of a "just and reasonable" service.

  • Section 706 of the Telecommunications Act of 1996: This section authorizes the FCC to promote broadband deployment, which includes enhancing the security of internet routing.

  • Communications for Law Enforcement Act (CALEA): CALEA mandates that broadband providers prevent unauthorized interception of communications, providing a basis for requiring measures against BGP hijacking.

The FCC underscores the critical importance of BGP security for both public safety and national security, justifying its regulatory intervention in this area.

Next Steps

The proposed rules are set to affect all retail broadband service providers, with specific reporting obligations for the large providers identified in the NPRM. However, there is a 30-day window after the FCC's publication in the Federal Register for the providers to comment on the rules and a 45-day window for them to issue replies.

The NPRM proposed rules highlight the necessary steps being taken when it comes to the outing of internet traffic by addressing vulnerabilities in BGP. By requiring detailed risk management plans and regular reporting, the FCC aims to mitigate the risks associated with BGP misconfigurations and hijacking, ensuring a more secure and reliable internet infrastructure.

Legal.io Logo
Welcome to Legal.io

Connect with peers, level up skills, and find jobs at the world's best in-house legal departments

More from Legal.io

Google Sues Scammers Over Counterfeit Bard AI

The lawsuit filed by Google seeks financial compensation for individuals who suffered damages as a result of the scam.

Google Sues Scammers Over Counterfeit Bard AI
TechnologyInternetPatent
L-1B Denials Particularly High for Indian Nationals

L-1B classification was initially created by Congress to allow multinational companies to easily transfer employers from foreign operations to intra-company offices in the United States.

L-1B Denials Particularly High for Indian Nationals
Immigration
How to Keep Associates From Quitting

The latest report by the NALP Foundation reveals insights into the dynamics of associate attrition and hiring, providing a roadmap for firms looking to improve retention.

How to Keep Associates From Quitting
CareerLaw Firms
CS Disco Appoints New CEO to Steer Company Post-Controversy

CS Disco Inc. welcomes Eric Friedrichsen as its new CEO, taking the reins after a series of controversies including the former CEO's resignation amid allegations.

CS Disco Appoints New CEO to Steer Company Post-Controversy
CareerTechnology
3 Habits That Destroy Credibility in the Workplace

No matter where you are in your career path, your professional habits could always use an overhaul. Your habits in the workplace can influence your success both now and in your future roles. Positive habits can help you build and maintain credibility, while less constructive habits can hinder relationships and influence. In this article, we’ll go over 3 particularly problematic habits.

3 Habits That Destroy Credibility in the Workplace
CareerMental HealthDiversity and Inclusion
Embracing AI in Legal Departments: A Guide to Successful Integration

In legal operations, it's become imperative to figure out the best way to successfully integrate AI tools.

Embracing AI in Legal Departments: A Guide to Successful Integration
Legal OperationsTechnologyIn-House Counsel
Legal.io Newsletter - July 30, 2021

Published weekly on Friday, the Legal.io Newsletter covers the latest in legal, talent & tech.

Legal.io Newsletter - July 30, 2021
Legal OperationsTechnologyIn-House Counsel
Zoom Welcomes Cheree McAlpine as New Chief Legal Officer

Zoom Video Communications appoints Cheree McAlpine as CLO, marking the end of a four-year period with an interim leader at the helm of its legal department.

Zoom Welcomes Cheree McAlpine as New Chief Legal Officer
CareerIn-House Counsel
Legal.io Logo
Welcome to Legal.io

Connect with peers, level up your skills, and find jobs at the world's best in-house legal departments