AuDA cracks down on registrar system security

Powered by SC Magazine
 

Proposed standard a 'world first'.

Australian domain authority auDA is preparing to impose minimum IT security requirements on .au registrars.

The authority today released a draft of its Information Security Standard, which it said had been prepared "following a serious security incident involving an accredited registrar in mid-2011".

DistributeIT was hit by a malicious attacker in June last year. The system downtime affected a number of domain resellers.

In an issues paper (pdf), auDA said its security standard was "intentionally flexible" to operate within a range of business models.

It is intended that registrars will have to pass an independent vetting of their compliance with the standard every three years, along with more frequent "interim assessments". The frequency was being floated among industry members.

The standard would be phased in for existing registrars over the next two years.

Those who do not pass either interim or full compliance checks would be suspended and have three months to right their systems.

Accreditation could be terminated after this time "on the grounds that auDA can have no confidence in the registrar's ability to protect the security of their registry connection or their registrant data".

auDA is seeking input from the domain industry on the current security standard proposal.

Copyright © iTnews.com.au . All rights reserved.


AuDA cracks down on registrar system security
 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 765

Vote