DNS Security Facilitation - Technical Study Group: Difference between revisions
Line 36: | Line 36: | ||
# Investigate Best Practices for Authentication | # Investigate Best Practices for Authentication | ||
# Empower [[CPH|Contracted Parties]] to adopt security enhancements to the domain registration systems and authoritative name services | # Empower [[CPH|Contracted Parties]] to adopt security enhancements to the domain registration systems and authoritative name services | ||
# | # Offer [https://www.bugcrowd.com/bug-bounty-list/ Bug Bounty Program] Feasibility Funding | ||
# Educate DNS stakeholders to make available the appropriate standards-based authentication mechanisms for all interactions | # Educate DNS stakeholders to make available the appropriate standards-based authentication mechanisms for all interactions | ||
# Improve documentation and understanding of Registry Lock features and promote their use; explain the differences between Registry and Registrar Lock to registrants; facilitate the standardization of minimum requirements for Registry and Registrar Lock services | # Improve documentation and understanding of Registry Lock features and promote their use; explain the differences between Registry and Registrar Lock to registrants; facilitate the standardization of minimum requirements for Registry and Registrar Lock services |