Secure Inter-Domain Routing

Current Status

The NCCoE recently released draft practice guide NIST SP 1800-14, Protecting the Integrity of Internet Routing: Border Gateway Protocol (BGP) Route Origin Validation. The public comment period closed on October 15, 2018.

For ease of use, the guide is available in volumes:

  • SP 1800-14A: Executive Summary (PDF)
  • SP 1800-14B: Approach, Architecture, and Security Characteristics (PDF)
  • SP 1800-14C: How-To Guides (PDF)

Or download the complete guide (PDF).

If you have questions or suggestions, please email us at


The National Cybersecurity Center of Excellence (NCCoE) at NIST recognizes the need to ensure safe and secure internet traffic exchange, and recently completed part one of this project series: Protecting the Integrity of Internet Routing: Border Gateway Protocol (BGP) Route Origin Validation. This project used commercially available technologies to develop a cybersecurity reference design that can be implemented to increase security and functionality in internet routing.

The Border Gateway Protocol (BGP) is the adopted default routing protocol of the Internet. BGP facilitates the exchange of routing information—determining feasible paths for data to flow from a source to a destination. Autonomous Systems and Internet Service Providers exchange route information using BGP to achieve interconnectivity. When the exchange of route information is inaccurate (either done maliciously or accidentally), traffic will either take inefficient paths through the internet, arrive at malicious sites that masquerade legitimate destinations, or never arrive to its intended destination.

This project demonstrates how the implementation of BGP Route Origin Validation, using Resource Public Key Infrastructure, can address and resolve the erroneous exchange of network routes. This project has resulted in a NIST Cybersecurity Practice Guide—a publicly available description of the solution and practical steps needed to implement a cybersecurity reference design that addresses this challenge.

Questions? Comments? Reach us at

Collaborating Vendors

Organizations participating in this project submitted their capabilities in response to an open call in the Federal Register for all sources of relevant security capabilities from academia and industry (vendors and integrators). The following respondents with relevant capabilities or product components (identified as “Technology Partners/Collaborators” herein) signed a Cooperative Research and Development Agreement to collaborate with NIST in a consortium to build this example solution.

AT&T Logo
CenturyLink Logo
Comcast Logo
George Washington University Logo
Juniper Networks logo
Palo Alto Networks logo