Changes

Jump to navigation Jump to search
Line 35: Line 35:  
# Investigate DNS Security Enhancements  
 
# Investigate DNS Security Enhancements  
 
# Investigate Best Practices for Authentication
 
# Investigate Best Practices for Authentication
# Empower [[CPH|Contracted Parties]]
+
# Empower [[CPH|Contracted Parties]] to adopt security enhancements to the domain registration systems and authoritative name services
 
# Bug Bounty Program Feasibility Funding  
 
# Bug Bounty Program Feasibility Funding  
# Educate on Authentication
+
# Educate DNS stakeholders to make available the appropriate standards-based authentication mechanisms for all interactions
# Registry Locks
+
# Improve documentation and understanding of Registry Lock features and promote their use; explain the differences between Registry and Registrar Lock to registrants; facilitate the standardization of minimum requirements for Registry and Registrar Lock services
 
# Raise Awareness of Best Practices for [[ICANN Terms#Infrastructure|Infrastructure]] Security
 
# Raise Awareness of Best Practices for [[ICANN Terms#Infrastructure|Infrastructure]] Security
 
# DNS [[RBL|Blocking]] and Filtering
 
# DNS [[RBL|Blocking]] and Filtering
Bureaucrats, Check users, lookupuser, Administrators, translator
14,932

edits

Navigation menu