DNS Security Facilitation - Technical Study Group: Difference between revisions

Jessica (talk | contribs)
No edit summary
Jessica (talk | contribs)
 
(15 intermediate revisions by 2 users not shown)
Line 1: Line 1:
The '''DNS Security Facilitation - Technical Study Group''' ('''DSFI-TSG''') was formed to investigate and determine what ICANN should and should not do based on the technical landscape -- not about [[DNS Abuse]] -- but about security threats and attack vectors, including the DNS itself. This study group provides technical guidance to the ICANN CEO on what ICANN can initiate to facilitate DNS security.<ref>[DSFTSG Charter]</ref> This group does not make policy but it may make policy recommendations.  
The '''DNS Security Facilitation - Technical Study Group''' ('''DSFI-TSG''') was formed to investigate and determine what ICANN should and should not do based on the technical landscape -- not about [[DNS Abuse]] -- but about security threats and attack vectors, including the DNS itself. This study group provides technical guidance to the ICANN CEO on what ICANN can initiate to facilitate DNS security.<ref>[https://community.icann.org/display/DSFI/Project+Charter+and+Scope?preview=/136119336/146736288/DSFI%20Technical%20Study%20Group%20Charter.pdf DSFTSG Charter]</ref> This group does not make policy but it may make policy recommendations.  
==Members==
==Members==
* [[Merike Käo]] (Coordinator)
* [[Merike Käo]] (Coordinator)
Line 27: Line 27:


==History==
==History==
The group met nine times between November 2020 and June 2021 to answer the aforementioned questions and draft recommendations for the [[ICANN CEO]].<ref>[https://community.icann.org/display/DSFI/Work+Plan+and+Timeline?preview=/136120022/160727866/DSFI%20Milestones%20Timeline.pdf</ref> DSFTSG Timeline]
The group met 29 times between June 2020 and September 2021 to answer the aforementioned questions and draft recommendations for the [[ICANN CEO]].<ref>[https://community.icann.org/display/DSFI/Work+Plan+and+Timeline?preview=/136120022/160727866/DSFI%20Milestones%20Timeline.pdf DSFTSG Key Meetings Timeline]</ref> The group submitted its draft report to the ICANN CEO in October 2021, just prior to ICANN 72.<ref>[https://www.icann.org/en/blogs/details/dns-security-facilitation-technical-study-group-delivers-final-report-13-10-2021-en ICANN.org Blog - DSFI-TSG Delivers its Final Report], October 13, 2021</ref> At [[ICANN 72]], the group presented its findings in a session during Prep Week.<ref>[https://72.schedule.icann.org/meetings/4FLR7CFvzr2JrnL3p ICANN 72 Archive - Introducing the DSFI-TSG], October 14, 2021</ref><br/>
In April 2022, the Office of the Chief Technology Officer ([[OCTO]]) announced its plan to process the DSFI-TSG proposals. Although the DSFI-TSG recommendations were beyond the scope of the [[AC|Action Request Register]], which is for [[ICANN Board]] advice, the OCTO is using the ARR framework for the DSFI_TSG recommendations. The four phases of this process are: understand, evaluate, consult the [[ICANN Community]], and implementation.<ref>[https://www.icann.org/en/blogs/details/icann-is-developing-a-process-for-evaluating-dsfi-tsg-recommendations-20-04-2022-en DSFI-TSG Recommendation Implementation Process]</ref>
 
==Work Product==
The Final Report indicated that [[ICANN Organization]] can improve the security of the [[DNS]] directly, through funded research and education, and indirectly through partnerships, community collaboration, and [[Contractual Compliance|contractual controls]] and offered 12 recommendations:<ref>[https://community.icann.org/display/DSFI/DSFI+TSG+Final+Report?preview=/176623416/176623417/DSFI-TSG-Final-Report.pdf DSFI-TSG Final Report, ICANN Community]</ref>
# Develop a [https://www.redlegg.com/solutions/advisory-services/tabletop-exercise-pretty-much-everything-you-need-to-know Tabletop Exercise] Program to exercise incident-response procedures and identify operational gaps for services provided by registries and registrars and facilitate closing them
# Continue developing the definitions of [[DNS Abuse]] and support the security and research communities in identifying and mitigating DNS abuse via SME research funding
# Investigate DNS Security Enhancements
# Investigate Best Practices for Authentication
# Empower [[CPH|Contracted Parties]] to adopt security enhancements to the domain registration systems and authoritative name services
# Offer [https://www.bugcrowd.com/bug-bounty-list/ Bug Bounty Program] Feasibility Funding
# Educate DNS stakeholders to make available the appropriate standards-based authentication mechanisms for all interactions
# Improve documentation and understanding of [[Domain Locking|Registry Lock]] features and promote their use; explain the differences between Registry and Registrar Lock to registrants; facilitate the standardization of minimum requirements for Registry and Registrar Lock services
# Raise Awareness of Best Practices for [[ICANN Terms#Infrastructure|Infrastructure]] Security by participating in initiatives such as [[MANRS]] and [[KINDNS]] and promoting the adoption of [[DMARC]], [[SPF]], [[TLSA]], [[DANE]], and [[DNSSEC]]
# Help the [[ICANN Community]], contracted parties, and others understand the risks and benefits of DNS [[RBL|Blocking]] and filtering for [[SSR|security and stability reasons]], best practices, tooling for DNS interdependencies to avoid large-scale collateral damage, using the Public Suffix List ([[PSL]]), sharing lists to avoid overblocking, and general reputation hygiene
# Develop and deploy a formalized incident-response process across the DNS industry that allows for interaction with others in the ecosystem
# Raise [https://ieeexplore.ieee.org/document/9248526 Covert Channel] Awareness
 
Of these recommendations, the TSG said the two top priorities for ICANN were conducting a study and offering a report on best practices for authentication against the different roles and risks in the DNS and encouraging the development and deployment of a formalized incident-response process across the DNS industry that allows for interaction with others in the ecosystem.
 
==References==
==References==
[[Category:DNS Abuse Responses]]
[[Category:Cybersecurity]]