Security at ARIN

ARIN is committed to the security of your data. We have implemented various measures to protect your user account and record information and to ensure that your communication with ARIN is trusted.

What We Do to Secure Your Data

We follow industry-standard security best practices to protect your data that is stored and managed at ARIN.

  • We maintain firewalls and other network security systems to prevent unauthorized access to our network where your data is stored.
  • We actively monitor all of our systems to detect questionable network traffic and behavior, unauthorized login attempts, and other attempted security breaches.
  • All HTTP services utilize Transport Layer Security (HTTPS), which ensures the confidentiality and integrity of communications between you and ARIN.
  • ARIN systems have regularly-updated software installed to protect against viruses, phishing attempts, malware, and other security risks.
  • Sensitive information is encrypted at rest and available only for authenticated users using access control.
  • Private keys used for our secure systems are stored safely. Our Resource Public Key Infrastructure (RPKI) keys are stored in a Federal Information Processing Standards (FIPS)-compliant hardware security module (HSM). Domain Name System Security (DNSSEC) keys are stored using a security appliance.

Security Audits

ARIN performs third-party security audits on an annual basis. These third-party audits are comprised of but not limited to:

  • social engineering attacks
  • penetration testing
  • application-specific vulnerability testing
  • internal penetration attacks

The results of the audits are shared with the ARIN Board. If necessary, remediation work is scheduled to address any outstanding security issues.

Internal Security Measures

We take a number of steps internally to protect your data.

  • We require two-factor authentication for employees to gain access to our network, and our network requires regularly-scheduled password changes.
  • ARIN employees undergo training in security principles and best practices.
  • All employees have managed software installed on their systems to protect against viruses, phishing, and other security risks.
  • Regular software updates, especially those that contain security fixes, are pushed automatically to employees' systems.
  • All employee email is analyzed to protect against spam, viruses, impersonation and other phishing attempts.

Access control is limited to those who require access to private customer data. When end-of-life equipment is retired, all hard drives and other storage media are shredded, on premises, by an independently-verified and audited third-party vendor with ARIN personnel supervision. Physical locations where ARIN data is stored, including our headquarters and off-site data centers, are secure, and access is restricted through multiple security implementations.

We do not store credit card information and credit card payment processing is handled by a third-party service.

Security for External System Users

External users of ARIN systems are required to use strong passwords for their ARIN user accounts, and we encourage the use of two-factor authentication. This authentication requires users to verify their identity using a second authentication method (such as an authenticator app on a mobile phone) in addition to their password.

ARIN provides some services that require the use of Application Programming Interface (API) Keys. Users create an API key that is tied to their user account and provides additional security when interacting with ARIN’s systems. As an additional measure, all mail from hostmaster@arin.net is signed with a PGP signature.

What You Can Do to Secure Your Data

Although ARIN has implemented many security measures, we need your help in ensuring these methods keep your data safe. Some of the ways in which you can protect your data include:

  • Ensure that your contact information for your Internet number resources is up to date.
  • Secure your ARIN user account by setting up two-factor authentication to ensure that no one else can log in as you and access your data.
  • Enable DNS security (DNSSEC) to provide data authentication and data integrity for DNS query resolution using public key cryptography.
  • Certify your routing data using Resource Public Key Infrastructure (RPKI) to ensure that authorized autonomous systems (ASes) are used to route data for your IP addresses. You can also obtain certified routing data from ARIN for use in your network routing decisions by downloading ARIN’s Trust Anchor Locator and using it with an RPKI validator.
  • Submit your routing data to ARIN’s Internet Routing Registry (IRR) to ensure that the routes to your network are recognized as authenticated. You can also obtain authorized routing information to use in your network routing decisions.

More Information

If you have questions about ARIN’s security practices, please submit a question using Ask ARIN in your ARIN user account or by using the feedback form available in the header of this webpage.

If you have an issue or problem regarding any of ARIN’s security tools, please submit a service issue report using the form linked in the footer of this webpage.