• About Us
  • Advertise With Us

Sunday, June 15, 2025

  • Home
  • About
  • Events
  • Webinar Leads
  • Advertising
  • AI
  • DevOps
  • Cloud
  • Security
  • Home
  • About
  • Events
  • Webinar Leads
  • Advertising
  • AI
  • DevOps
  • Cloud
  • Security
Home Security

Beyond RPKI: Fixing the Gaps in Routing Security Today

Barbara Capasso by Barbara Capasso
April 24, 2025
in Security
0
Global map showing secure and insecure BGP routing paths with RPKI validation overlays in red and green lights.

A futuristic digital map of Earth displaying global internet routing paths. Green paths indicate secure BGP routes with RPKI validation, while red paths highlight insecure or vulnerable routes. Ideal visual representation for an article on internet routing security.

0
SHARES
504
VIEWS
Share on FacebookShare on Twitter

By Barbara Capasso · LevelAct

The internet’s invisible architecture—the routing layer—remains both a marvel and a minefield. Despite years of attention, routing security remains a global weak point. While promising initiatives like RPKI have gained traction, we now face new challenges: adoption plateaus, policy bloat, and a lack of sustained momentum. In this article, we examine where we stand today, what’s holding us back, and how the industry can move forward.


RPKI Route Origin Validation (ROV): Progress, but Are We Plateauing?

Resource Public Key Infrastructure (RPKI) adoption has accelerated over the past three years. Major cloud providers, regional IXPs, and Tier 1 networks have implemented Route Origin Validation (ROV) to reject invalid BGP route announcements. According to recent MANRS metrics, RPKI usage now covers over 50% of global routing paths.

But growth is slowing.

  • Many large players have adopted ROV, but smaller ASNs and regional ISPs have yet to follow.
  • A lack of technical expertise and operational automation tools prevents mass adoption.
  • There is still no universal enforcement mechanism or incentive model to mandate ROV implementation.

The plateau suggests that voluntary adoption may have reached its limit—pushing us toward a new question: What will it take to make RPKI universal?


The Problem with Bloated AS-SETs: Risk Hiding in Plain Sight

Autonomous System Sets (AS-SETs) in Internet Routing Registries (IRRs) are designed to define which ASNs a provider should accept routes from. But over time, these AS-SETs grow uncontrollably.

  • Some AS-SETs contain thousands of entries—many of which are stale, defunct, or misconfigured.
  • Poorly maintained AS-SETs make route filtering unreliable, opening doors to route leaks and route hijacks.
  • Attackers can exploit these outdated entries to inject malicious prefixes into otherwise trusted routing paths.

Cleaning up AS-SETs is a low-effort, high-impact fix—but it’s often overlooked in favor of larger architectural discussions. This issue underscores a broader truth: routing security isn’t just about crypto—it’s about hygiene.


Sustaining Momentum: Measurement, Pressure, and Transparency

A handful of technical communities are actively pushing routing security forward:

  • MANRS (Mutually Agreed Norms for Routing Security) now includes over 1,000 participants.
  • CAIDA’s BGPStream and NLNOG RING provide public data on BGP anomalies.
  • Regional NOGs (Network Operator Groups) host workshops to train engineers on RPKI and IRR filtering.

Yet the majority of networks still don’t monitor their own routing behavior—let alone secure it. The key to progress lies in:

  • Measurement frameworks: to benchmark adoption and validate claims
  • Community pressure: from peers, IXPs, and upstream providers
  • Regulatory influence: particularly for critical infrastructure and national backbones

Until routing security becomes a business risk discussed at the board level, it will remain an underfunded engineering task.


Conclusion: A Turning Point, or a Treading Point?

Routing security is no longer a “nice to have.” It’s a foundational part of internet resilience in an era of rising attacks, state-sponsored interference, and supply chain vulnerabilities. We’ve come far—but we haven’t yet secured the routing layer.

To push forward, we must:

  • Incentivize universal RPKI adoption
  • Reduce the technical debt hidden in AS-SETs
  • Build a culture of accountability around routing decisions

We know what to do. The question is—will the internet community do it before the next big breach reminds us why we should have?

Tags: AS-SETsBGP hijacksborder gateway protocolCAIDAinternet infrastructureIRRMANRSNetwork Securityroute origin validationrouting securityRPKIRPKI adoption
Previous Post

Edge Meets AI: How Cisco and Nutanix Are Redefining Intelligent Infrastructure

Next Post

Secure Every Commit: Automating AppSec Tests in CI/CD

Next Post
DevSecOps pipeline automation visualization with GitHub, GitLab, and Azure DevOps integration layers

Secure Every Commit: Automating AppSec Tests in CI/CD

  • Trending
  • Comments
  • Latest
Hybrid infrastructure diagram showing containerized workloads managed by Spectro Cloud across AWS, edge sites, and on-prem Kubernetes clusters.

Accelerating Container Migrations: How Kubernetes, AWS, and Spectro Cloud Power Edge-to-Cloud Modernization

April 17, 2025
Tangled, futuristic Kubernetes clusters with dense wiring and hexagonal pods on the left, contrasted by an organized, streamlined infrastructure dashboard on the right—visualizing Kubernetes sprawl vs GitOps control.

Kubernetes Sprawl Is Real—And It’s Costing You More Than You Think

April 22, 2025
Developers and security engineers collaborating around application architecture diagrams.

Security Is a Team Sport: Collaboration Tactics That Actually Work

April 16, 2025
Modern enterprise DDI architecture visual showing DNS, DHCP, and IPAM integration in a hybrid cloud environment

Modernizing Network Infrastructure: Why Enterprise-Grade DDI Is Mission-Critical

April 23, 2025
Microsoft Empowers Copilot Users with Free ‘Think Deeper’ Feature: A Game-Changer for Intelligent Assistance

Microsoft Empowers Copilot Users with Free ‘Think Deeper’ Feature: A Game-Changer for Intelligent Assistance

0
Can AI Really Replace Developers? The Reality vs. Hype

Can AI Really Replace Developers? The Reality vs. Hype

0
AI and Cloud

Is Your Organization’s Cloud Ready for AI Innovation?

0
Top DevOps Trends to Look Out For in 2025

Top DevOps Trends to Look Out For in 2025

0
Aembit and the Rise of Workload IAM: Secretless, Zero-Trust Access for Machines

Aembit and the Rise of Workload IAM: Secretless, Zero-Trust Access for Machines

May 21, 2025
Omniful: The AI-Powered Logistics Platform Built for MENA’s Next Era

Omniful: The AI-Powered Logistics Platform Built for MENA’s Next Era

May 21, 2025
Whiteswan Identity Security: Zero-Trust PAM for a Unified Identity Perimeter

Whiteswan Identity Security: Zero-Trust PAM for a Unified Identity Perimeter

May 21, 2025
Futuristic cybersecurity dashboard with AWS, cloud icon, and GC logos connected by glowing nodes, surrounded by ISO 27001 and SOC 2 compliance labels.

CloudVRM® by Findings: Real-Time Cloud Risk Intelligence for Modern Enterprises

May 16, 2025

Recent News

Aembit and the Rise of Workload IAM: Secretless, Zero-Trust Access for Machines

Aembit and the Rise of Workload IAM: Secretless, Zero-Trust Access for Machines

May 21, 2025
Omniful: The AI-Powered Logistics Platform Built for MENA’s Next Era

Omniful: The AI-Powered Logistics Platform Built for MENA’s Next Era

May 21, 2025
Whiteswan Identity Security: Zero-Trust PAM for a Unified Identity Perimeter

Whiteswan Identity Security: Zero-Trust PAM for a Unified Identity Perimeter

May 21, 2025
Futuristic cybersecurity dashboard with AWS, cloud icon, and GC logos connected by glowing nodes, surrounded by ISO 27001 and SOC 2 compliance labels.

CloudVRM® by Findings: Real-Time Cloud Risk Intelligence for Modern Enterprises

May 16, 2025

Welcome to LevelAct — Your Daily Source for DevOps, AI, Cloud Insights and Security.

Follow Us

Facebook X-twitter Youtube

Browse by Category

  • AI
  • Cloud
  • DevOps
  • Security
  • AI
  • Cloud
  • DevOps
  • Security

Quick Links

  • About
  • Webinar Leads
  • Advertising
  • Events
  • Privacy Policy
  • About
  • Webinar Leads
  • Advertising
  • Events
  • Privacy Policy

Subscribe Our Newsletter!

Be the first to know
Topics you care about, straight to your inbox

Level Act LLC, 8331 A Roswell Rd Sandy Springs GA 30350.

No Result
View All Result
  • About
  • Advertising
  • Calendar View
  • Events
  • Home
  • Privacy Policy
  • Webinar Leads
  • Webinar Registration

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.