Securing Global Routing Infrastructure Through MANRS

Exploring how MANRS initiatives strengthen internet resilience and connectivity worldwide

By Medha deb
Created on

Understanding the Foundation of Internet Connectivity

The internet operates as a vast, interconnected ecosystem where billions of devices communicate across continents and oceans. At the heart of this ecosystem lies the routing infrastructure—the intricate system that determines how data packets traverse from source to destination. Just as a ship’s captain relies on navigational charts and communication with other vessels to ensure safe passage through treacherous waters, internet service providers and network operators depend on reliable routing protocols to direct traffic efficiently and securely.

The complexity of modern internet architecture cannot be overstated. Every day, trillions of data packets move through network pathways managed by thousands of independent operators worldwide. These operators must trust one another to maintain the integrity of the routing system, yet historically, this trust has been built on informal agreements and best practices rather than standardized security protocols. This gap between necessity and implementation created vulnerabilities that bad actors could exploit, threatening the stability of global connectivity.

The challenge intensified as the internet matured and cyber threats became more sophisticated. Malicious actors discovered that by manipulating routing information, they could redirect traffic to unauthorized destinations, eavesdrop on communications, or launch large-scale denial-of-service attacks. These routing attacks did not require cutting-edge hacking tools; instead, they exploited fundamental weaknesses in the trust assumptions underlying internet protocols that had remained largely unchanged for decades.

The Evolution of Collaborative Security Standards

Recognizing the need for systemic improvement, a coalition of forward-thinking network operators convened in 2014 to develop a unified approach to routing security. Rather than waiting for regulatory mandates or top-down enforcement, these industry leaders chose a collaborative model where operators could voluntarily adopt standardized practices. This approach reflected a deep understanding that internet infrastructure functions best when stakeholders work together toward common goals, acknowledging both shared vulnerabilities and mutual interest in maintaining a stable, trustworthy network.

The resulting initiative, known as Mutually Agreed Norms for Routing Security (MANRS), represents a pragmatic solution to a complex problem. MANRS establishes a framework of four fundamental operational improvements and procedural steps that network operators can implement to significantly reduce routing-based security incidents. The initiative has grown from its initial group of participants to encompass hundreds of operators, internet exchange points, content delivery networks, and cloud service providers across every continent.

Unlike prescriptive regulatory frameworks that impose specific technologies or solutions, MANRS operates on principles of flexibility and practicality. Operators maintain autonomy in choosing implementation methods that suit their infrastructure, while committing to achieving specific security outcomes. This approach has proven remarkably effective in driving adoption, as it removes the excuse that compliance is technically infeasible or economically prohibitive.

Core Components of the MANRS Framework

The MANRS initiative organizes its recommendations into four actionable components, each addressing distinct categories of routing vulnerabilities:

Operational Improvements: Prevention and Verification

The first tier of MANRS focuses on operational enhancements that network operators can deploy to prevent common routing attacks. This includes implementing mechanisms to verify the authenticity of routing announcements and ensuring that operators only advertise address space they legitimately control. By validating that incoming routing information comes from authorized sources and that announced prefixes match actual ownership records, operators can prevent IP address hijacking and prefix theft—two of the most damaging routing attacks.

Operators participating in MANRS commit to filtering invalid or fraudulent routing announcements from their networks before they propagate further. This filtering creates multiple layers of defense throughout the internet, similar to how a series of checkpoints can prevent unauthorized entry at various stages. When one operator filters invalid routes, they not only protect their own infrastructure but also reduce the likelihood that their peers will inadvertently amplify malicious announcements.

Procedural Steps: Governance and Coordination

Beyond technical implementations, MANRS establishes procedural requirements that formalize how operators manage routing security responsibilities. These procedural steps create accountability frameworks and communication channels that facilitate rapid response to incidents. Operators must maintain security contacts, respond to abuse reports promptly, and coordinate with peers when suspicious routing activity is detected.

The procedural components also address the challenge of attribution and remediation. When a routing attack occurs, investigators need clear lines of communication to trace the attack’s origin and coordinate a response. MANRS ensures that participating operators maintain current contact information and commit to investigating security incidents reported by other MANRS participants. This collaborative investigation model turns potential adversaries into coordinated defenders of shared infrastructure.

Expanding Impact Across Global Networks

The reach of MANRS has expanded significantly since its inception, reflecting growing recognition of routing security’s importance. Internet exchange points—the physical locations where networks interconnect to exchange traffic—have become prominent adopters, enforcing MANRS standards among their members. Content delivery networks and major cloud providers have integrated MANRS requirements into their operational policies, effectively extending the framework’s reach to hundreds of thousands of smaller operators who interconnect with these larger entities.

This cascading adoption creates network effects where security standards propagate throughout the internet ecosystem. An operator implementing MANRS protections gains both direct security benefits and indirect advantages through improved protection of peers and upstream networks. Over time, this creates pressure for continued adoption, as operators recognize they cannot fully protect themselves while remaining interconnected to non-compliant networks.

Regional internet registries and technical communities have also embraced MANRS, incorporating it into their best practice guidelines and training programs. This integration ensures that new operators entering the market receive MANRS education early in their operational lifecycle, establishing security consciousness as a baseline expectation rather than a special requirement.

Addressing Implementation Challenges

Despite MANRS’s clear benefits, implementation faces persistent challenges. Smaller operators with limited technical resources may lack the expertise to deploy sophisticated routing security mechanisms. MANRS addresses this through community resources, including technical documentation, training programs, and peer support networks where experienced operators share implementation knowledge.

Legacy infrastructure presents another challenge. Older routing equipment may not support MANRS-recommended features, forcing operators to choose between capital investment in network modernization or accepting reduced security posture. MANRS recognizes this constraint by providing guidance on achieving security goals with existing infrastructure, even if suboptimal, while establishing clear upgrade pathways for long-term improvement.

Another consideration involves the economic incentives affecting implementation timelines. Individual operators may struggle to justify security investments when competitors operate without these protections and incur no immediate penalties. MANRS addresses this by emphasizing collective benefits—when sufficient operators adopt MANRS standards, the entire ecosystem becomes more resilient, creating market pressure that rewards early adopters and penalizes laggards.

The Role of Institutional Support

The Internet Society and Global Cyber Alliance have provided essential institutional support enabling MANRS’s growth and evolution. These organizations facilitate coordination among operators, maintain central resources and documentation, and advocate for routing security improvements at policy and regulatory levels. Their support includes funding for technical working groups, hosting community meetings, and conducting research on emerging routing threats.

This institutional infrastructure proved particularly valuable as MANRS transitioned operational responsibility. The partnership between the Internet Society and Global Cyber Alliance reflects recognition that sustaining a global security initiative requires distributed governance and institutional resilience. Neither organization operates in isolation; instead, they collaborate with operator communities, technical standards bodies, and regional stakeholders to ensure MANRS remains responsive to evolving threats and operator needs.

Measuring Progress and Identifying Gaps

MANRS operates with transparency regarding both achievements and remaining challenges. Community reports detail adoption metrics, showing the percentage of global routing table announcements originating from MANRS-compliant operators. Current data demonstrates that MANRS participants account for significant portions of global route announcements, indicating substantial reach across diverse operator categories.

However, adoption gaps remain. Certain geographic regions lag in MANRS participation, reflecting differences in technical capacity, regulatory environments, and market structures. Similarly, some operator categories—particularly smaller regional providers—have slower adoption rates than major internet exchange points and large carriers. These gaps do not undermine MANRS’s overall impact but highlight opportunities for targeted outreach and support.

Research on routing attacks continues revealing new attack vectors that MANRS standards can mitigate or prevent. As threat landscapes evolve, MANRS adapts by incorporating emerging best practices and updating operational recommendations. This iterative improvement process ensures the framework remains relevant despite changing threat environments.

Future Directions for Routing Security

The future trajectory for MANRS and routing security appears promising, driven by several converging factors. Increased awareness of routing attacks’ potential impacts has elevated routing security to prominence among both operators and policymakers. Regulatory bodies worldwide are incorporating routing security considerations into internet infrastructure requirements, creating formal incentives beyond MANRS’s voluntary framework.

Technological advances also support enhanced routing security. Adoption of DNSSEC and RPKI (Resource Public Key Infrastructure) technologies provides cryptographic validation mechanisms that enable operators to verify routing announcements with greater confidence. As these technologies mature and deployment costs decline, MANRS operators gain increasingly sophisticated tools for detecting and preventing unauthorized routing information.

Emerging internet architectures and services create new routing security challenges. As internet usage patterns shift toward edge computing, content delivery, and distributed services, operators must adapt routing security practices to protect these evolving topologies. MANRS communities continue monitoring these developments and updating guidance accordingly.

Key Takeaways on Collaborative Infrastructure Security

  • MANRS represents a collaborative industry response to systemic routing security vulnerabilities rather than a regulatory mandate
  • The framework combines technical implementations with procedural requirements, addressing both prevention and response capabilities
  • Participation extends from major operators to smaller networks through cascading adoption and peer pressure mechanisms
  • Institutional support from established organizations ensures MANRS remains responsive, well-resourced, and focused on practical improvements
  • Continued evolution and adaptation maintain MANRS relevance as threat landscapes and technology environments change
  • Remaining adoption gaps indicate opportunities for targeted outreach and capacity building in underserved regions

Frequently Asked Questions

What constitutes a routing attack and why does it matter?

Routing attacks manipulate the information networks use to direct data traffic, potentially redirecting communications to unintended destinations. These attacks matter because they can compromise confidentiality, enable eavesdropping, disrupt services, and undermine user trust in internet communication.

How does MANRS differ from other security initiatives?

MANRS distinguishes itself through its collaborative, voluntary structure and focus specifically on routing infrastructure. Rather than imposing universal mandates, MANRS provides practical frameworks that operators can adapt to their circumstances while maintaining commitment to security outcomes.

Who can participate in MANRS?

Network operators of all sizes, internet exchange points, content delivery networks, cloud providers, and regional internet registries can participate. Participation requirements center on commitment to implementing MANRS recommendations and maintaining security procedures, with flexibility in specific implementation approaches.

What resources exist for operators implementing MANRS?

MANRS communities maintain extensive documentation, provide technical training, facilitate peer-to-peer knowledge sharing, and offer implementation guidance tailored to operators’ circumstances. Regional affiliations and technical working groups provide localized support.

How is MANRS effectiveness measured?

Effectiveness is measured through adoption metrics showing the percentage of global routing announcements originating from compliant operators, incident tracking that documents prevented attacks, and research on routing security improvements attributable to MANRS implementation.

References

  1. Mutually Agreed Norms for Routing Security (MANRS) — Internet Society. Accessed 2026-05-09. https://www.internetsociety.org/learning/manrs/
  2. MANRS Community Report 2021 — Global Cyber Alliance & Internet Society. 2021. https://manrs.org/resources/community-report-2021/
  3. Achieving Greater Heights for MANRS — Internet Society Blog. 2023-11. https://www.internetsociety.org/blog/2023/11/achieving-greater-heights-for-manrs/
  4. IETF RFC 6811: BGP Prefix Origin Validation — Internet Engineering Task Force. 2013. https://tools.ietf.org/html/rfc6811
  5. Resource Public Key Infrastructure (RPKI) Overview — Internet Assigned Numbers Authority (IANA). Accessed 2026-05-09. https://www.iana.org/topics/rpki/
Medha Deb is an editor with a master's degree in Applied Linguistics from the University of Hyderabad. She believes that her qualification has helped her develop a deep understanding of language and its application in various contexts.

Read full bio of medha deb