Action 1: Prevent propagation of incorrect routing information
Our organization is committed to routing security best practices. We maintain comprehensive prefix filtering based on both IRR and RPKI data to ensure only legitimate routes are accepted and propagated. This multi-layered approach includes origin validation, AS-path verification, and prefix limit enforcement. We regularly audit our routing policies and actively participate in the global routing security community to stay current with emerging threats and protection techniques. Through these efforts, we contribute to a more secure and reliable global routing infrastructure.
Action 3: Facilitate global operational communication and coordination
Our commitment to operational communication and coordination is demonstrated through our active participation in the global network operator community. We maintain accurate, current contact information in all industry databases and respond promptly to operational inquiries. Our NOC is staffed 24/7 with personnel trained in routing security issues, and we actively contribute to community discussions about routing security best practices.
We regularly participate in regional operator forums and security working groups to share knowledge and collaborate on solutions to routing security challenges. By fostering these relationships, we help build a more resilient internet ecosystem where operators can quickly coordinate responses to routing issues before they impact end users.
Action 4: Facilitate validation of routing information on a global scale
Our organization is committed to improving routing security through comprehensive validation mechanisms. We have fully implemented RPKI for all our resources and perform route origin validation for all BGP sessions. We actively participate in industry efforts to increase RPKI adoption by encouraging our peers and customers to implement similar protections.
We believe that widespread adoption of routing validation technologies is essential for a secure and stable internet. To that end, we regularly share our implementation experiences through technical blogs, conference presentations, and direct engagement with other network operators. By creating a validated routing ecosystem, we contribute to reducing route hijacks and leaks that can disrupt internet services globally.