AuDA cracks down on registrar system security

Powered by SC Magazine
 

Proposed standard a 'world first'.

Australian domain authority auDA is preparing to impose minimum IT security requirements on .au registrars.

The authority today released a draft of its Information Security Standard, which it said had been prepared "following a serious security incident involving an accredited registrar in mid-2011".

DistributeIT was hit by a malicious attacker in June last year. The system downtime affected a number of domain resellers.

In an issues paper (pdf), auDA said its security standard was "intentionally flexible" to operate within a range of business models.

It is intended that registrars will have to pass an independent vetting of their compliance with the standard every three years, along with more frequent "interim assessments". The frequency was being floated among industry members.

The standard would be phased in for existing registrars over the next two years.

Those who do not pass either interim or full compliance checks would be suspended and have three months to right their systems.

Accreditation could be terminated after this time "on the grounds that auDA can have no confidence in the registrar's ability to protect the security of their registry connection or their registrant data".

auDA is seeking input from the domain industry on the current security standard proposal.

Copyright © iTnews.com.au . All rights reserved.


AuDA cracks down on registrar system security
 
 
 
Top Stories
Business-focused Windows 10 brings back the Start menu
Microsoft skips 9 for the "greatest enterprise platform ever".
 
Feeling Shellshocked?
Stay up to date with patching for the Bash bug.
 
Amazon forced to reboot EC2 to patch Xen bug
Rolling restarts over next week.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  5%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1376

Vote