{"id":2215,"date":"2014-02-03T08:00:03","date_gmt":"2014-02-03T15:00:03","guid":{"rendered":"http:\/\/chrisgrundemann.com\/?p=2215"},"modified":"2014-02-03T08:00:03","modified_gmt":"2014-02-03T15:00:03","slug":"securing-core","status":"publish","type":"post","link":"https:\/\/chrisgrundemann.com\/index.php\/2014\/securing-core\/","title":{"rendered":"Securing the Core"},"content":{"rendered":"<p><a href=\"http:\/\/www.internetsociety.org\/deploy360\/wp-content\/uploads\/2014\/01\/bgp-150.png\"><img decoding=\"async\" class=\"lazyload alignright\" alt=\"BGP\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27150%27%20height%3D%27145%27%20viewBox%3D%270%200%20150%20145%27%3E%3Crect%20width%3D%27150%27%20height%3D%27145%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"http:\/\/www.internetsociety.org\/deploy360\/wp-content\/uploads\/2014\/01\/bgp-150.png\" width=\"150\" height=\"145\" \/><\/a>BGP. Border Gateway Protocol. The de-facto standard routing protocol of the Internet. The nervous system of the Internet. I don&#8217;t think I can overstate the importance, the criticality of BGP to the operation of the modern Internet. BGP is the glue that holds the Internet together at its core. And like so many integral pieces of the Internet, it, too, is designed and built on the principle of trust. That trust has largely been justified. The folks who operate the individual networks that make up the Internet are generally interested in keeping the Internet operating, in keeping the packets flowing. And they do a great job, for the most part.<\/p>\n<p>However, as the scope, scale, and importance of the Internet have grown, so has the risk. Accidents happen, and there <em>are<\/em> nefarious people out there.<\/p>\n<p>Luckily the industry has taken note in recent years. Ongoing work in the IETF&#8217;s <a title=\"Secure InterDomain Routing - Charter\" href=\"https:\/\/datatracker.ietf.org\/wg\/sidr\/charter\/\" target=\"_blank\">Secure InterDomain Routing (SIDR)<\/a> working group is creating solutions. Specifically, the group is focused on ensuring proper route origination through the development of a <a title=\"An Infrastructure to Support Secure Internet Routing - IETF RFC6480\" href=\"https:\/\/datatracker.ietf.org\/doc\/rfc6480\/\" target=\"_blank\">Resource Public Key Infrastructure (RPKI)<\/a> and on ensuring AS path validity through the development of the <a title=\"BGPSEC Overview - IETF Internet-Draft\" href=\"https:\/\/datatracker.ietf.org\/doc\/draft-ietf-sidr-bgpsec-overview\/\" target=\"_blank\">BGPSEC<\/a> protocol.<\/p>\n<p>We need to pause here for a moment though. These newer efforts to secure BGP, and with it the core of the Internet, are absolutely laudable, and much good will come from them. But there are some other, perhaps simpler, perhaps older techniques to secure BGP that are too often overlooked by network operators today. Things like prefix filters, max-prefix limits, and setting a TTL with your peer. A fairly recent IETF Internet-Draft on <a title=\"BGP options and security - IETF I-D\" href=\"https:\/\/datatracker.ietf.org\/doc\/draft-ietf-opsec-bgp-security\/\" target=\"_blank\">BGP operations and security<\/a> describes these:<\/p>\n<blockquote><p>&#8230;measures to protect the BGP sessions itself (like TTL, MD5, control plane filtering) and to better control the flow of routing information, using prefix filtering and automatization of prefix filters, max-prefix filtering, AS path filtering, route flap dampening and BGP community scrubbing.<\/p><\/blockquote>\n<p>Of course, if every network engineer knew how to deploy all of the available mechanisms for securing BGP, the core of the Internet would be a much safer, more secure and resilient place. That&#8217;s where Deploy360&#8217;s newest topic &#8220;<a title=\"Securing BGP\" href=\"http:\/\/www.internetsociety.org\/deploy360\/securing-bgp\/\" target=\"_blank\">Securing BGP<\/a>&#8221; comes in!<\/p>\n<p>The <a title=\"Deploy360\" href=\"http:\/\/www.internetsociety.org\/deploy360\/\" target=\"_blank\">Internet Society Deploy360 Programme<\/a> is designed to put practical information grounded in real-world experiences and case studies into the hands of network operators who need to deploy key Internet technologies. Because we believe that securing its core is key to the future of a free and open Internet, we&#8217;ve launched a new topic on Securing BGP:<\/p>\n<blockquote><p>This section of our site on \u201c<em>Securing BGP<\/em>\u201d is focused on providing the information that network operators need to understand in order to secure their routers and ensure that they are doing their part for the security and resiliency of the overall Internet routing infrastructure. We are not focused here on a specific approach but rather outlining the different approaches and tools that are available to help secure your routing systems.<\/p><\/blockquote>\n<p>The new Securing BGP topic will collect, curate, and create documentation to help network operators deploy the full range of BGP security mechanisms. From adding MD5 to your peering sessions, to proper prefix filtering, and on to RPKI and BGPSEC when the time is right.<\/p>\n<h1>You can help!<\/h1>\n<p>We need your help Securing BGP! As was noted in the <a title=\"Introducing A New Deploy360 Topic: Securing BGP\" href=\"http:\/\/www.internetsociety.org\/deploy360\/blog\/2014\/01\/introducing-a-new-deploy360-topic-securing-bgp\/\" target=\"_blank\">topic launch announcement<\/a>, there are several ways for you to get involved:<\/p>\n<blockquote><p><strong>1. Read through our pages and content roadmap &#8211;<\/strong> Please take a look through<a href=\"http:\/\/www.internetsociety.org\/deploy360\/securing-bgp\/\"> our \u201cSecuring BPG\u201d set of pages<\/a>, and also please take a look at <a href=\"http:\/\/www.internetsociety.org\/deploy360\/roadmap\/securing-bgp\/\">our content roadmap for [Securing] BGP<\/a>. \u00a0Are the current resources listed helpful? \u00a0Is the way we have structured the information helpful? \u00a0Will the resources we list on our roadmap help\u00a0<em>you<\/em> make your routers more secure?<\/p>\n<p><strong>2. Send us suggestions<\/strong>\u00a0\u2013 If you know of a report, whitepaper, tutorial, video, case study, site or other resource we should consider adding to the site,\u00a0<a href=\"http:\/\/www.internetsociety.org\/deploy360\/feedback\/\">please let us know<\/a>. We have a <a href=\"http:\/\/www.internetsociety.org\/deploy360\/roadmap\/securing-bgp\/\">list of many resources that we are considering<\/a>, but we are always looking for more.<\/p>\n<p><strong>3. Volunteer<\/strong>\u00a0\u2013 If you are very interested in this topic and would like to actively help us on an ongoing basis,\u00a0<a href=\"http:\/\/www.internetsociety.org\/deploy360\/about\/volunteer\/\" target=\"_blank\">please fill out our volunteer form<\/a>\u00a0and we\u2019ll get you connected to what we are doing.<\/p>\n<p><strong>4. Help us spread the word<\/strong>\u00a0\u2013 As we publish resources and blog posts relating to securing BGP,\u00a0<a href=\"http:\/\/www.internetsociety.org\/deploy360\/about\/contact\/\" target=\"_blank\">please help us spread those links through social networks<\/a>\u00a0so that more people can learn about the topic.<\/p><\/blockquote>\n<p>What are you waiting for? Let&#8217;s secure BGP together!<\/p>\n<p style=\"text-align: right;\"><em>This post originally appeared on <a title=\"Original post, on CircleID\" href=\"http:\/\/www.circleid.com\/posts\/20140131_securing_the_core\/\" target=\"_blank\">CircleID<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The new Deploy360 Securing BGP topic will collect, curate, and create documentation to help network operators deploy the full range of BGP security mechanisms. From adding MD5 to your peering sessions, to proper prefix filtering, and on to RPKI and BGPSEC when the time is right.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3,9,24,27],"tags":[101,114,311,331,340,342,343,346,354,468,476,524,558,588,590,602,604,674],"class_list":["post-2215","post","type-post","status-publish","format-standard","hentry","category-circleid","category-internet","category-security","category-technology","tag-bgp","tag-border-gateway-protocol","tag-ietf","tag-internet","tag-internet-protocols","tag-internet-society","tag-internet-standards","tag-internet-draft","tag-ip-hijacking","tag-network-engineer","tag-networks","tag-peering","tag-prefix","tag-resiliency","tag-resource-public-key-infrastructure","tag-router","tag-routing-protocols","tag-technology_internet"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing the Core ~ Chris Grundemann<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/chrisgrundemann.com\/index.php\/2014\/securing-core\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing the Core ~ Chris Grundemann\" \/>\n<meta property=\"og:description\" content=\"The new Deploy360 Securing BGP topic will collect, curate, and create documentation to help network operators deploy the full range of BGP security mechanisms. From adding MD5 to your peering sessions, to proper prefix filtering, and on to RPKI and BGPSEC when the time is right.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/chrisgrundemann.com\/index.php\/2014\/securing-core\/\" \/>\n<meta property=\"og:site_name\" content=\"Chris Grundemann\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/chris.grundemann\" \/>\n<meta property=\"article:published_time\" content=\"2014-02-03T15:00:03+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.internetsociety.org\/deploy360\/wp-content\/uploads\/2014\/01\/bgp-150.png\" \/>\n<meta name=\"author\" content=\"~Chris\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/ChrisGrundemann\" \/>\n<meta name=\"twitter:site\" content=\"@ChrisGrundemann\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"~Chris\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2014\\\/securing-core\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2014\\\/securing-core\\\/\"},\"author\":{\"name\":\"~Chris\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#\\\/schema\\\/person\\\/16a6af2797267c7d91f29876d5a0870f\"},\"headline\":\"Securing the Core\",\"datePublished\":\"2014-02-03T15:00:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2014\\\/securing-core\\\/\"},\"wordCount\":758,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2014\\\/securing-core\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.internetsociety.org\\\/deploy360\\\/wp-content\\\/uploads\\\/2014\\\/01\\\/bgp-150.png\",\"keywords\":[\"bgp\",\"Border Gateway Protocol\",\"IETF\",\"Internet\",\"Internet protocols\",\"Internet Society\",\"Internet standards\",\"Internet-Draft\",\"IP hijacking\",\"network engineer\",\"Networks\",\"Peering\",\"prefix\",\"resiliency\",\"Resource Public Key Infrastructure\",\"Router\",\"Routing protocols\",\"Technology_Internet\"],\"articleSection\":[\"CircleID\",\"Internet\",\"Security\",\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2014\\\/securing-core\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2014\\\/securing-core\\\/\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2014\\\/securing-core\\\/\",\"name\":\"Securing the Core ~ Chris Grundemann\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2014\\\/securing-core\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2014\\\/securing-core\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.internetsociety.org\\\/deploy360\\\/wp-content\\\/uploads\\\/2014\\\/01\\\/bgp-150.png\",\"datePublished\":\"2014-02-03T15:00:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2014\\\/securing-core\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2014\\\/securing-core\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2014\\\/securing-core\\\/#primaryimage\",\"url\":\"http:\\\/\\\/www.internetsociety.org\\\/deploy360\\\/wp-content\\\/uploads\\\/2014\\\/01\\\/bgp-150.png\",\"contentUrl\":\"http:\\\/\\\/www.internetsociety.org\\\/deploy360\\\/wp-content\\\/uploads\\\/2014\\\/01\\\/bgp-150.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/2014\\\/securing-core\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/chrisgrundemann.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CircleID\",\"item\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/category\\\/circleid\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Securing the Core\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#website\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/\",\"name\":\"Chris Grundemann\",\"description\":\"Use technology, marketing, and strategy to take your growing business to the next level.\",\"publisher\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/chrisgrundemann.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#organization\",\"name\":\"Grundemann Technology Solutions\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/cropped-GTS-Logo.png\",\"contentUrl\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/cropped-GTS-Logo.png\",\"width\":512,\"height\":512,\"caption\":\"Grundemann Technology Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/ChrisGrundemann\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/grundemann\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/cgrundemann\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCJ3Pk4AAVMBG4KCzxYAtExA\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#\\\/schema\\\/person\\\/16a6af2797267c7d91f29876d5a0870f\",\"name\":\"~Chris\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg\",\"caption\":\"~Chris\"},\"description\":\"Creative|Technologist. Curious. Boisterous. Autotelic Autodidact. Heretic. Hacker. Rider of Boards. Writer of Words. ...Traveler of Time...\",\"sameAs\":[\"https:\\\/\\\/chrisgrundemann.com\",\"https:\\\/\\\/www.facebook.com\\\/chris.grundemann\",\"http:\\\/\\\/instagram.com\\\/chrisgrundemann\",\"www.linkedin.com\\\/in\\\/cgrundemann\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/ChrisGrundemann\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCJ3Pk4AAVMBG4KCzxYAtExA\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing the Core ~ Chris Grundemann","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/chrisgrundemann.com\/index.php\/2014\/securing-core\/","og_locale":"en_US","og_type":"article","og_title":"Securing the Core ~ Chris Grundemann","og_description":"The new Deploy360 Securing BGP topic will collect, curate, and create documentation to help network operators deploy the full range of BGP security mechanisms. From adding MD5 to your peering sessions, to proper prefix filtering, and on to RPKI and BGPSEC when the time is right.","og_url":"https:\/\/chrisgrundemann.com\/index.php\/2014\/securing-core\/","og_site_name":"Chris Grundemann","article_author":"https:\/\/www.facebook.com\/chris.grundemann","article_published_time":"2014-02-03T15:00:03+00:00","og_image":[{"url":"http:\/\/www.internetsociety.org\/deploy360\/wp-content\/uploads\/2014\/01\/bgp-150.png","type":"","width":"","height":""}],"author":"~Chris","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/ChrisGrundemann","twitter_site":"@ChrisGrundemann","twitter_misc":{"Written by":"~Chris","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/chrisgrundemann.com\/index.php\/2014\/securing-core\/#article","isPartOf":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2014\/securing-core\/"},"author":{"name":"~Chris","@id":"https:\/\/chrisgrundemann.com\/#\/schema\/person\/16a6af2797267c7d91f29876d5a0870f"},"headline":"Securing the Core","datePublished":"2014-02-03T15:00:03+00:00","mainEntityOfPage":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2014\/securing-core\/"},"wordCount":758,"commentCount":1,"publisher":{"@id":"https:\/\/chrisgrundemann.com\/#organization"},"image":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2014\/securing-core\/#primaryimage"},"thumbnailUrl":"http:\/\/www.internetsociety.org\/deploy360\/wp-content\/uploads\/2014\/01\/bgp-150.png","keywords":["bgp","Border Gateway Protocol","IETF","Internet","Internet protocols","Internet Society","Internet standards","Internet-Draft","IP hijacking","network engineer","Networks","Peering","prefix","resiliency","Resource Public Key Infrastructure","Router","Routing protocols","Technology_Internet"],"articleSection":["CircleID","Internet","Security","Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/chrisgrundemann.com\/index.php\/2014\/securing-core\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/chrisgrundemann.com\/index.php\/2014\/securing-core\/","url":"https:\/\/chrisgrundemann.com\/index.php\/2014\/securing-core\/","name":"Securing the Core ~ Chris Grundemann","isPartOf":{"@id":"https:\/\/chrisgrundemann.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2014\/securing-core\/#primaryimage"},"image":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2014\/securing-core\/#primaryimage"},"thumbnailUrl":"http:\/\/www.internetsociety.org\/deploy360\/wp-content\/uploads\/2014\/01\/bgp-150.png","datePublished":"2014-02-03T15:00:03+00:00","breadcrumb":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2014\/securing-core\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/chrisgrundemann.com\/index.php\/2014\/securing-core\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chrisgrundemann.com\/index.php\/2014\/securing-core\/#primaryimage","url":"http:\/\/www.internetsociety.org\/deploy360\/wp-content\/uploads\/2014\/01\/bgp-150.png","contentUrl":"http:\/\/www.internetsociety.org\/deploy360\/wp-content\/uploads\/2014\/01\/bgp-150.png"},{"@type":"BreadcrumbList","@id":"https:\/\/chrisgrundemann.com\/index.php\/2014\/securing-core\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/chrisgrundemann.com\/"},{"@type":"ListItem","position":2,"name":"CircleID","item":"https:\/\/chrisgrundemann.com\/index.php\/category\/circleid\/"},{"@type":"ListItem","position":3,"name":"Securing the Core"}]},{"@type":"WebSite","@id":"https:\/\/chrisgrundemann.com\/#website","url":"https:\/\/chrisgrundemann.com\/","name":"Chris Grundemann","description":"Use technology, marketing, and strategy to take your growing business to the next level.","publisher":{"@id":"https:\/\/chrisgrundemann.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/chrisgrundemann.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/chrisgrundemann.com\/#organization","name":"Grundemann Technology Solutions","url":"https:\/\/chrisgrundemann.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/","url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png","contentUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png","width":512,"height":512,"caption":"Grundemann Technology Solutions"},"image":{"@id":"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/ChrisGrundemann","https:\/\/www.linkedin.com\/company\/grundemann","https:\/\/www.linkedin.com\/in\/cgrundemann\/","https:\/\/www.youtube.com\/channel\/UCJ3Pk4AAVMBG4KCzxYAtExA"]},{"@type":"Person","@id":"https:\/\/chrisgrundemann.com\/#\/schema\/person\/16a6af2797267c7d91f29876d5a0870f","name":"~Chris","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg","url":"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg","caption":"~Chris"},"description":"Creative|Technologist. Curious. Boisterous. Autotelic Autodidact. Heretic. Hacker. Rider of Boards. Writer of Words. ...Traveler of Time...","sameAs":["https:\/\/chrisgrundemann.com","https:\/\/www.facebook.com\/chris.grundemann","http:\/\/instagram.com\/chrisgrundemann","www.linkedin.com\/in\/cgrundemann","https:\/\/x.com\/https:\/\/twitter.com\/ChrisGrundemann","https:\/\/www.youtube.com\/channel\/UCJ3Pk4AAVMBG4KCzxYAtExA"]}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/ps8ie-zJ","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/posts\/2215","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/comments?post=2215"}],"version-history":[{"count":0,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/posts\/2215\/revisions"}],"wp:attachment":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/media?parent=2215"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/categories?post=2215"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/tags?post=2215"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}