It is time for a refresh of the SP Security materials used by many over the years. Back in 2002, several people in the emerging “Service Provider Security” field pulled together a list of top practices every Operator should deploy. These “NSP-SEC Top 10” techniques became the foundation of our toolkit that is used daily in all parts of the Internet. Years later, these materials require a refresh and a new tour of training to empower new generations of peers and ensure that as many ASNs as possible have these tools deployed.
The following workshop presentations are the latest modules. These are updated and maintained.
- 0001 – Threat & Risk 2017-07-24
- 0002 – Key Principles of a Successful Internet Engineer 2017-07-24
- 0003 Can vendors ever provide secure solutions? 2017-07-24
- 0004 Are you ready for the next attack? Reviewing the SP Security Checklist 2017-07-24
- 0005 – Operational Security Community 2017-07-23
- 0006 – Point Protection 2017-07-24
- 0007 – Edge Protection 2017-07-24
- 0008 – Remote Triggered Black Hole (RTBH) 2017-07-24
- 0009 – Sink Holes, Dark IP and HoneyNets 2017-07-24
- 0010 – Source Address Validation 2017-07-24
- 0011 – Control Plane Protection – Essentials 2017-07-24
- 0012 – Total Visibility 2017-07-24
The Operators Security Toolkit will grow organically with each module developing to meet the needs of the operator community. There will be a special focus on deployment of the tools needed to allow security practitioners who work on the investigations to productively interact with network operations teams.
Workshop Papers and Reading List
These documents are part of the recommended reading list. These documents help Security conscious Operators gain the knowledge to help them deploy a more resilient and secure network.
- Demand Security from your Vendors. Step by step “conversation” guide to foster meaningful conversations between the Operator and their vendors.
- Filtering Exploitable Ports and Minimizing Risk to and from Your Customers
- Conficker Working Group Lessons Learned. This is a “must read” document for anyone working in Security. It provides insight into how Trust Groups work to protect the Internet.
- Preparing for the next wave of DOS Attacks. Two articles help organizations with a checklist of actions – Preparing for the next DDOS Wave and Reporting DoS Attacks & Fighting Back Against DOS Attacks, These are industry consensus recommendations from the team who hunted down the DD4BC DOS Extorsion racket.
How to request a part of all of the Operator’s Security Toolkit Workshop?
Please send workshop request to Barry Greene (email@example.com). The workshop modules are designed to be presented with each module standing on their own, sections of the module, a mix of the modules (full day) or the entire workshop (1 week). The 1-week workshop includes hands on virtual labs on RTBH and other essential tools for turning routing protocols into a powerful security tool.