Explore Legal.io

For Clients
Legal.io company logo
Hire Talent
Find the best fit for any legal role
For Members
Jobs
The best legal jobs, updated daily
Salaries
Benchmark compensation for any legal role
Learn
Learn and grow with our community
Events
Connect with peers at exclusive events
Apps
Tools to streamline legal work
Advertise on Legal.io
Post a job for free
Reach more qualified applicants quickly
Advertise with Us
Reach a targeted audience

For Clients

Hire Talent
Legal.io company logo
Solutions
Find the best fit for any legal role
New Hire
Get highly qualified candidates in days
Popular Roles
Data & Tools
Budget Calculator
Plan and manage your legal budget
Salary Insights
Compensation data for legal roles
Vendor Directory
The ultimate list of legal tech tools

FCC Proposes Rules to Strengthen BGP Security

The FCC has issued a Notice of Proposed Rulemaking to address security vulnerabilities in the Border Gateway Protocol (BGP), requiring large broadband providers to develop comprehensive BGP Risk Management Plans and submit detailed quarterly reports.

FCC Proposes Rules to Strengthen BGP Security

The Federal Communications Commission (FCC) issued a Notice of Proposed Rulemaking (NPRM) earlier this month. This notice is aimed at addressing some of the more significant security vulnerabilities in the Border Gateway Protocol (BGP), the foundational technology that routes internet traffic between networks.

This proposal pushes for retail broadband internet providers to develop and maintain comprehensive plans to mitigate any vulnerabilities. Doing this will enhance the overall security of internet traffic routing.

The FCC is the authority in charge of regulating this aspect of internet infrastructure and to make sure it is rooted in its recent classification of retail broadband internet access as a "telecommunications service,". This classification brings it within the scope of the FCCs regulatory jurisdiction.

Background on BGP and Its Vulnerabilities

The modern internet architecture available consists of numerous interconnected networks known as Autonomous Systems (ASes). These systems are designed to rely on routers to direct traffic, using routing tables to determine the optimal paths for data to travel.

Here is where BGP comes in, as it facilitates this process by enabling ASes to advertise routes they can handle, which other ASes then incorporate into their routing tables.

This decentralized and trust-based system, however, is vulnerable to misconfigurations and malicious attacks, such as BGP hijacking. If any attack is successful, there are significant disruptions, unauthorized surveillance, and data breaches, highlighting the need for robust security measures.

BGP Risk Management Plans

The NPRM requires large broadband providers to file detailed BGP Risk Management Plans with the FCC. To do this, broadband providers need to outline their strategies for implementing Resource Public Key Infrastructure (RPKI). RPKI is a cryptographic system designed to secure internet routing by verifying the legitimacy of route advertisements. The proposed BGP Plans must include:

  • Processes for creating and maintaining Route Origin Authorizations (ROAs)

  • Factors influencing the creation and maintenance of ROAs

  • Goals and timelines for ROA registrations

  • Criteria for measuring progress

  • Implementation of Route Origin Validation (ROV) filtering at interconnection points

  • Contractual requirements for upstream third parties to provide ROV filtering

While smaller providers may not be required to file these plans with the FCC, they must keep them available for inspection upon request. All BGP Plans will be treated as confidential, safeguarding the sensitive nature of the information.

Detailed Quarterly Reporting

In addition to the BGP Plans, large broadband providers must submit quarterly reports to the FCC, detailing their progress in securing internet routing. These reports will include:

  • Lists of Registry Org IDs and Autonomous System Numbers (ASNs)

  • Details of address holdings and reassignments

  • Information on IP prefixes in originated routes, including those covered by ROAs

  • The extent of ROV filtering performed for peers and customers

The FCC aims to gather data that is difficult to aggregate from public sources, ensuring comprehensive monitoring of the providers' efforts to secure internet routing.

Additional Measures and Implementation Timeline

With the risk management in check and the reports done, the NPRM is also seeking comments on: 

  • Imposing conditions on address space assignment contracts to ensure compliance with RPKI reporting

  • Setting deployment goals for RPKI implementation, proposing one year for large providers and two years for others

  • Requiring outreach and education efforts to support downstream providers

The first BGP plans are to be filed 90 days after the effective date of the rules, with quarterly reports starting 30 days after the necessary steps are concluded for the rule to take effect.

The FCC's Justification and Authority

The FCC asserts its regulatory authority based on several statutory grounds:

  • Title II and Title III of the Communications Act: These provisions empower the FCC to regulate telecommunications services, ensuring secure routing as part of a "just and reasonable" service.

  • Section 706 of the Telecommunications Act of 1996: This section authorizes the FCC to promote broadband deployment, which includes enhancing the security of internet routing.

  • Communications for Law Enforcement Act (CALEA): CALEA mandates that broadband providers prevent unauthorized interception of communications, providing a basis for requiring measures against BGP hijacking.

The FCC underscores the critical importance of BGP security for both public safety and national security, justifying its regulatory intervention in this area.

Next Steps

The proposed rules are set to affect all retail broadband service providers, with specific reporting obligations for the large providers identified in the NPRM. However, there is a 30-day window after the FCC's publication in the Federal Register for the providers to comment on the rules and a 45-day window for them to issue replies.

The NPRM proposed rules highlight the necessary steps being taken when it comes to the outing of internet traffic by addressing vulnerabilities in BGP. By requiring detailed risk management plans and regular reporting, the FCC aims to mitigate the risks associated with BGP misconfigurations and hijacking, ensuring a more secure and reliable internet infrastructure.

Legal.io Logo
Welcome to Legal.io

Connect with peers, level up skills, and find jobs at the world's best in-house legal departments

More from Legal.io

U.S. Law Firm Pay Raises Rise for Second Year in a Row

Top firms set a new benchmark in the industry with significant salary increases.

U.S. Law Firm Pay Raises Rise for Second Year in a Row
Law FirmsCareer
OpenAI: Top Lawyers Threaten Exit Amid Board Dispute and Company's Rapid Expansion and Altman Rejoins the Company

OpenAI's legal team is facing potential upheaval as over 700 employees, including key legal figures Jason Kwon and Che Chang, threaten to leave following the ouster of CEO Sam Altman, amidst rapid expansion of the legal and public policy staff.

OpenAI: Top Lawyers Threaten Exit Amid Board Dispute and Company's Rapid Expansion and Altman Rejoins the Company
General CounselTechnology
Penn State Appoints Tabitha R. Oman as Vice President and General Counsel

The university announced Oman as their new VP and GC effective August 21st.

Penn State Appoints Tabitha R. Oman as Vice President and General Counsel
General CounselNewsletter
Canada Enforces Online Streamer Contributions

The CRTC's new Online Streaming Act requires online streaming services to contribute 5% of their Canadian revenue to support diverse local content.

TechnologyEntertainment and SportsGovernment
Microsoft Will Pay for Infringement Suits Against Its AI Customers

The move is likely to make generative AI more usable, allaying concerns businesses may have about potential copyright issues.

Microsoft Will Pay for Infringement Suits Against Its AI Customers
TechnologyLitigationProduct Liability
Molson Coors Appoints Natalie Maciolek as Chief Legal and Government Affairs Officer

Molson Coors, a leading global brewer, has announced the appointment of Natalie Maciolek as its Chief Legal and Government Affairs officer, effective September 5, 2023.

Molson Coors Appoints Natalie Maciolek as Chief Legal and Government Affairs Officer
General CounselCareerNewsletter
DLA Piper Matches Market Rates with Salary Increases

Competitive legal market ensures that DLA Piper matches Cravath scale for associates.

DLA Piper Matches Market Rates with Salary Increases
Law FirmsCareer
How to Turn Meetings from Pointless to Productive

Ah, the team meeting – it’s one of those sacred office rituals, its contours familiar to workers across the country. We gather up our notepads, head to the breakout room, listen to people making a series of loosely connected points with only a vague relevance to our job, before everyone leaves wondering ‘What was the point in that?’ Yes, it’s fair to say that many meetings do not inspire employees, aid workflow, or get much done. Still, there are always going to be times when colleagues need to get together to talk to each other. How can you transform meetings from pointless and dull to productive and exciting? Let’s find out!

How to Turn Meetings from Pointless to Productive
Career
Legal.io Logo
Welcome to Legal.io

Connect with peers, level up your skills, and find jobs at the world's best in-house legal departments