Members:
- Boban Krsic
- Denise Michel
- Eric Osterweil
- James Gannon
- Kerry-Ann Barrett
- Noorul Ameen
- Žarko Kecić
Mandate:
The sub team will be responsible for reviewing the completeness and effectiveness of ICANNs internal security processes and the effectiveness of the ICANN security framework.
Where can I find sources and information?
Useful Links:
Latest documents:
TOPIC - ICANN INTERNAL SECURITY PROCESSES
Related Bylaw | 4.6 (c)(ii)(A) 4.6 (c)(ii)(B) 4.6 (c)(iii) |
Skillset | IT Security, Audit, Risk Management, Disaster Recovery |
Work Items |
- What are, and how can the community measure the relevant DNS abuses - The evidence base: DNS health index and abuse data. What the evidence tells us; access to information (risks and benefits)
- Allocation of resources and priority within the organisation (includes budget and staffing) - Outreach and public information role (training, vulnerability disclosure, system attack mitigation etc) - Risk management, compliance with relevant frameworks.
- What are the white-hat operations that are taken in ICANN space that may need exceptional handling (gratis for registering sink-holes, etc.) (can this be included in improving security of unique identifiers/threat mitigation?)
|
Documents
Date | Document (Versions in Red are latest) | File |
---|---|---|
Conference Calls & Meetings
Date | Meeting | UTC |
---|---|---|
Templates
Date | Document | File |
---|---|---|
Archives
Date | Document | File |
---|---|---|