AuDA cracks down on registrar system security

Powered by SC Magazine
 

Proposed standard a 'world first'.

Australian domain authority auDA is preparing to impose minimum IT security requirements on .au registrars.

The authority today released a draft of its Information Security Standard, which it said had been prepared "following a serious security incident involving an accredited registrar in mid-2011".

DistributeIT was hit by a malicious attacker in June last year. The system downtime affected a number of domain resellers.

In an issues paper (pdf), auDA said its security standard was "intentionally flexible" to operate within a range of business models.

It is intended that registrars will have to pass an independent vetting of their compliance with the standard every three years, along with more frequent "interim assessments". The frequency was being floated among industry members.

The standard would be phased in for existing registrars over the next two years.

Those who do not pass either interim or full compliance checks would be suspended and have three months to right their systems.

Accreditation could be terminated after this time "on the grounds that auDA can have no confidence in the registrar's ability to protect the security of their registry connection or their registrant data".

auDA is seeking input from the domain industry on the current security standard proposal.

Copyright © iTnews.com.au . All rights reserved.


AuDA cracks down on registrar system security
 
 
 
Top Stories
ATO releases long-awaited Bitcoin guidance
Everyday investors escape the tax man.
 
Why the Weather Bureau’s new supercomputer is a 'gamechanger'
IT transformation starts to reap results.
 
Sydney Trains chief thinks beyond Opal
Plots app to help you find a seat on the train.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 428

Vote