USTelecom Cybersecurity Ratings
USTelecom Cybersecurity Ratings
USTelecom Cybersecurity Ratings
JANUARY 2024
PREPARED BY
Mr. Robert Mayer
Senior Vice President,
Cybersecurity & Innovation
USTelecom
O
ver the past many years, a group of cybersecurity rating firms have developed proprietary
methodologies that produce rankings for individual enterprises relying largely on publicly
available scans of their internet- facing assets. While these scores can provide important
insight on a company’s risk posture, the methodologies employed to achieve these outputs
have raised significant concerns when the assets evaluated are not controlled by the surveyed entity. These
methodological flaws are particularly problematic for telecommunications firms and Internet Service
Providers (ISPs) that provide their customers with blocks of IP addresses for use in their own organizations
or for the customers. This problem has been known for many years and as the use of cybersecurity scoring
services continues to grow, so have the harms associated with their often-misleading conclusions.
Since at least 2018, the rating firms have been aware of these concerns and at least one major scoring
company made a substantial concession when the U.S. Chamber of Commerce and FICO Cyber Score (since
acquired by ISS) revised their industry benchmarking initiative, (the Assessment of Business Cybersecurity
(ABC). In a subsequent report, they acknowledged that ISPs, Infrastructure as a Service (IaaS), telecom, and
cloud service providers “…with large IP address footprints controlled by IT and security teams outside their
direct control could increase the likelihood of double-counting assets when such assets would be more
appropriately attributed to the subscribing organizations.” They explained that “[F]or these reasons, we have
elected to exclude companies in this class and have adjusted the ABC and its various sub-indices.”
This report is intended to provide an update on progress in this area and focuses on issues that continue
to plague telecommunications firms and ISPs that must make substantial and ongoing investments to
segment massive sets of IP addresses. The report describes the quantitative mechanisms that are used
and why they continue to be a source of disagreement between telecommunications firms and security
rating vendors. The rating company business model is also critiqued and while it acknowledges the value
that fair and methodologically supported mechanisms can offer a variety of stakeholders from Boards
to procurement specialists evaluating third-party risk, it offers three constructive recommendations to
advance the interest of all parties.
First, the report notes that its purpose is not to make algorithmic design decisions for the security rating
companies. Instead, it urges these companies to consider alternatives for “asset discovery” in ways that
improve the validity and accuracy, and thus the utility of their products. Second, the authors explain why
the rating firms should provide an option for customized risk models based on the unique characteristics
of telecommunications firm’s’ threat landscape and business use cases. And third, the rating firms are
encouraged to engage proactively and collaboratively with customers to improve rating accuracy. It notes
that by working in such ways with the telecommunications providers, the rating firm would benefit from
continuous improvement in a very dynamic cyber ecosystem.
Finally, the report notes that initial communications with leading ratings providers have already produced
positive results. As evidence of such progress, both BitSight and Security Scorecard removed their industry
scores from their public-facing websites industry scores for telecommunications firms.
Background
Since 2018, several groups including the U.S. Chamber of Commerce, FICO, ETNO,1 and USTelecom2 have
reviewed the growing industry of cybersecurity risk ratings. Each of these studies has concluded that while
security ratings are important and provide value for boards, investors, underwriters, and third-party risk
management (TPRM), the accuracy and correctness of ratings algorithms can and should be improved to
avoid unintended reputational issues for telecommunications firms and Internet Service Providers (ISPs).
To illustrate the problem, consider that proxy advisory services companies who score Environmental, Social,
and Corporate Governance (ESG) for publicly traded companies have begun to use security ratings to grade
a company’s cybersecurity program and to determine corporate ESG scores.3 The financial community is
thus now using these scores for market investment decisions, and recent SEC rulings have removed the
obligation for proxy advisory companies to notify the target company before publishing their findings and
recommendations.
The result of this and other usage of security ratings creates considerable friction for telecommunications
companies and ISPs with various stakeholders, including their customers. Experience shows that
telecommunications firms and ISPs must spend considerable time and effort answering questions
from enterprise and government customers to explain why their published scores might be inexplicably
low—generally as a result of algorithmic deficiencies in the ratings calculations (explained below). While
such customers might understand the rationale, such interactions introduce business risk, including the
potential for revenue loss.
The primary goal of the work described in this report4 is to provide a comprehensive and updated summary
of the remaining issues associated with commercial ratings for telecommunications firms and ISPs,
and to recommend several practical near-term approaches to help address the challenge of solving this
problem. The report is based on a detailed review of previous analyses, one-on-one discussions with many
different domestic telecommunications firms and ISPs, and recent reviews held with several of the major
commercial cybersecurity ratings vendors.5
Establishing such understanding is obviously a multidimensional activity and cybersecurity ratings do not
remove the need for any team to review aspects of their own cyber protection ecosystem, or the ecosystem
Quantitative ratings are created using proprietary algorithms that utilize a wide range of cybersecurity-
related data gathered and derived from various sources, including public information, Internet scanning,
network behavior analysis, review of visible settings such as Domain-based Message Authentication,
Reporting, and Conformance (DMARC),6 and more. Such telemetry and data are then analyzed and
processed to generate a more comprehensive view of an organization’s cybersecurity posture.
A major aspect of commercial cybersecurity risk rating algorithms includes identification of a range of
Internet protocol (IP) addresses and domain names for a given company. This prompts a network scan
of the public infrastructure in the target company’s range for known security vulnerabilities. Proprietary
quantification algorithms are then used to determine the target company’s final cybersecurity score. We
mention this address scanning component because it represents a major point of disagreement between
telecommunications firms and security ratings vendors (see below).
As suggested above, security ratings are useful in many different contexts. For example, every organization,
including telecommunications firms and ISPs, relies on external vendors and third parties to support day-
to-day operations. Gaining insight into the cybersecurity posture of these entities through ratings can help
prevent security breaches. Similarly, for mergers and acquisitions (M&A), businesses must evaluate the
cybersecurity readiness of the companies they plan to acquire. Ratings offer a layer of added due diligence
for M&A teams.
It is worth mentioning that cybersecurity has also become a critical concern for executives and board
members, including ones without technical backgrounds. Ratings, if done properly, can provide an easily
ingested number that can be used to communicate security status and improvements. Ratings might also
be useful to include in cyber reporting obligations such as with recent requirements levied by the Securities
and Exchange Commission (SEC),7 but this remains to be confirmed in practice.
Other areas where security ratings are helpful include support for the cyber insurance industry, where
providers can use quantifications to assess risk and set premiums. Ratings also allow organizations to
benchmark their externally visible security performance against industry standards and competitors,
which can help to identify areas for improvement and measure the effectiveness of on-going cybersecurity
initiatives.
Transparency and accountability are among the most important aspects of security ratings that most
business and government stakeholders value. This includes the customers, investors, and partners of a rated
organization since all are increasingly concerned about cybersecurity. Publicly available ratings do much to
enhance the transparency of security posture and help to demonstrate an organization’s commitment to
cybersecurity.
Readers should note that we go to great lengths above to identify and reinforce that our position is not to
remove or discontinue the general use of cybersecurity ratings from commercial vendors. Rather, we intend
to point out the algorithmic inconsistencies that emerge when trying to assign a single numeric value on
Telecommunications firms and ISPs are different from normal enterprise companies in many ways
relevant to the manner in which cybersecurity ratings are developed. First, the business of such firms is
to support the external networking and infrastructure posture of their customers through the provision
and support of network services. The result is that external views of telecommunications firms and ISPs
are often intertwined with the external views offered by their customers. This creates inaccurate views
of the provider’s security posture—somewhat akin (using a non-technical analogy) to holding a landlord
responsible for how their tenants might be arranging their furniture.
Second, telecommunications firms and ISPs are incredibly complex entities from a network perspective
since networks are their products. As such, the challenge to represent the security posture for such
massively complicated organizations into a single, numeric figure of merit is considered by many in the
industry, including these authors, to be highly misaligned. As suggested above, this is not to say that ratings
cannot be used for large companies, but the business of a telecommunications firm and ISP is so complex
from an external network perspective, that it calls into question the feasibility of generating a single
accurate rating.
Below, we outline the three major issues we’ve collected through direct discussions with telecommunica-
tions firms and ISPs during 3Q2023 regarding cybersecurity ratings in this industry. Our interactions were
mostly with senior representatives from this industry including Chief Information Security Officers (CISOs)
and senior executives with security policy and legal responsibility. Major domestic Tier 1 providers were inter-
viewed, but the names of the principals are not listed here as per agreed-upon sharing protocol.9
1. Limited Control - Providers have a large number of IP addresses under their management due to the
vast number of customers they serve. Furthermore, managing these IP addresses involves dynamic as-
signment to users. Providers explain that they do not have direct control over the behavior of all devices
connected to their network. This leads to misattributions of security issues in the commercial ratings
algorithms.
The result might be a perception of a pay-to-play view of the ratings companies from a provider perspective.
No telecommunications firm or ISP suggested that such vendors should not approach these providers for
a potential commercial relationship, and every provider acknowledged the local usefulness of cybersecurity
ratings for third party risk management (TPRM), M&A due diligence, and security support for external part-
ner or other stakeholder ecosystems. This was universally agreed upon, which would seem to be good news
for the security ratings companies.
The view was frequently shared that providers should be considered in their own special category for
ratings agencies. Ideas shared ranged from extending the ratings to a series (i.e., linear vector) of ratings in
various categories to the development of ratings categories which might designate a telecommunications
firm or ISP as being within some equivalence class (e.g., world class, mature, moderate, etc.). This would
remove providers, for instance, from the same ratings scale and range as smaller entities.
It was also discussed that coordination between ratings vendors and providers should be more consistent,
on-going, and dynamic. The inevitable discussion about whether ratings agencies should be given data
about internal operations was raised by this author, but usually not met with great enthusiasm. This is
obviously an area in which the ratings companies would like to see progress, but some work will be required
to convince telecommunications firms and ISPs of the benefits and usefulness.
One area of our research worth mentioning is that considerable work was done reviewing the pros and cons
of security ratings versus maturity models such as from the National Institute of Standards and Technology
(NIST) Cybersecurity Framework,12 International Organization for Standardization (ISO) Standards, and the
Center for Internet Security (CIS) Controls. While many details emerged of the relative advantages and
disadvantages of each approach, we would not presume to suggest that the business models of the ratings
companies should change.13
As stated above, this presents particular problems for telecommunications firms and ISPs that are rated
based on IP address information that is both not under their direct control but might also be potentially
incorrect in the context of customer usage. Admittedly, this issue of ARIN accuracy applies much more
generally than for just telecommunications firms and ISPs, but it is certainly worth mentioning as an area
for improvement by ratings companies.
One potentially more accurate method for conducting IP-based asset discovery is to cross reference root
domains and associated sub-domains and Fully Qualified Domain Names (FQDNs) against a company’s
domain name system (DNS) records, which are actively maintained, and then perform reverse IP lookup.15
This approach could minimize misattribution or missed assets. This approach could also have the additional
benefit of identifying stale or misconfigured DNS settings.
While we do not view our purpose here as making design decisions for the security ratings companies that
have extensive experience and expertise designing algorithms, we do think reviewing alternatives for asset
discovery to be a worthwhile activity. The approach suggested above, for example, has the advantage of
mimicking how threat actors perform reconnaissance and, while it could require more effort than an ARIN
search, it could also provide better results.
Some questions we recommend security ratings companies consider in the context of improving their
process for IP-based asset discovery include the following:
1. Do you provide clarity and transparency regarding the algorithms that implement your asset discovery
process?
2. Does your algorithm include provision to accurately differentiate between provider-owned vs. customer-
owned IP addresses and assets?
3. Do you have a process for addressing potentially misattributed assets, either through a new calculation
or a change to the processing model?
The way this might be done would involve allowing cybersecurity risk rating clients, including telecommu-
nications firms and ISPs, to have the option to adjust their cybersecurity risk rating models based on the
Cybersecurity risk providers already tend to employ numerous factors in their calculations. This is evident in
that vendors often determine factor weights and thresholds at their own discretion, thus leading to different
cybersecurity risk rating providers providing different scores for the same company. This establishes
precedent that adjustments to a rating could be locally determined based on expert insight into the
specifics of a target environment.
Some questions we recommend security ratings companies consider in the context of improving their
cybersecurity risk models include the following:
1. Would you consider options to customize a risk score? Could the factors used to create the score be ad-
justed in the weighting and thresholds?
2. Do you provide transparency into the specific factors that go into your individual rating and the relative
weighting of the factors in the score?
3. Which of the following additional elements are embedded in your analysis to produce a comprehensive
risk score: Internal vulnerabilities, internal risks, external vulnerabilities, external risks, cloud security risks,
third-party vulnerabilities and risks, and human risk?
Key aspects of such stakeholder engagement would include on-going information sharing sessions
between providers and ratings companies, collaboration on joint research areas (perhaps focused on
improved risk models for third parties and suppliers), and active solicitation of input and guidance by the
ratings companies of their provider customers on improved features, new products, and new services.16
Some questions we recommend security ratings companies consider in the context of improving their
interactions with provider stakeholders include the following:
1. Are you able to actively collaborate with providers to collect feedback and verify actions taken to im-
prove risk rating?
2. How often do you update the information used to calculate the ratings score assigned to a provider?
3. Which of the following additional elements are embedded in your analysis to produce a comprehensive
risk score: Internal vulnerabilities, internal risks, external vulnerabilities, external risks, cloud security risks,
third-party vulnerabilities and risks, and human risk?
Additional work between the providers and ratings companies might be coordinated at an industry level
by organizations such as USTelecom or other cooperatives designed to encourage and enable information
sharing. The TAG Infosphere team remains committed to help both the ratings companies and providers
through its existing research and advisory services. It should be expected that excellent solutions become
available and hopefully deployed in 2024.
The good news is that initial communications with top cybersecurity ratings providers in the industry has
already led to progress. For example, two providers, Bitsight and SecurityScorecard, removed their industry
scores for telecommunications firms from their public-facing websites after concerns were expressed about
their accuracy by the industry. FortifyData has also provided useful input to the review process.
ABOUT USTELECOM
USTelecom is the national trade association representing network providers, innovators, suppliers, and
manufacturers connecting the world through the power of broadband.
ABOUT TAG
TAG Infosphere is a trusted research and advisory company that provides insights and recommendations in
cybersecurity, artificial intelligence, and climate science to thousands of commercial solution providers and
Fortune 500 enterprises.
8 A blog from US Telecom (see https://www.ustelecom.org/enhanc- 15 A reverse DNS lookup involves searching for IP addresses using
ing-cybersecurity-scoring-methodologies-a-call-for-improved-accu- domain names.
racy/) summarizes these concerns and helped to serve as a base for
this analysis. 16 As part of the research reported in this work, several sessions
were coordinated between providers and ratings vendors to share
9 Readers desiring more information on the interview process are views and solicit feedback.
welcome to reach out to this primary author at eamoroso@tag-cyber.
com. The discussions were held informally over video conference or 17 One of the authors from TAG serves as an industry analyst, and
phone and were designed to collect insight into their concerns with under such work, has existing paid contractual research and advisory
ratings in general, versus any concern with a specific vendor. While relationships with virtually all of the cybersecurity ratings vendors
no formal contractual non-disclosure paperwork was involved in and a large number of domestic ISPs. This on-going work involves
the discussions, existing relationships between this primary author formal agreements for the author and his team at TAG Infosphere to
(former CISO at AT&T for two decades) and the designates served as respond to research inquiries, share technical and business insights,
the basis for an informal agreement that the aggregated information and work various projects at the request of the vendor or ISP, some-
would be included in this report but without any specific attribu- times with great time-urgency for the customer. In virtually every
tion or even casual inference to the sharing executive. Any errors or case of the existing relationships, this topic of cybersecurity ratings
omissions in this report are entirely the responsibility of the author for ISPs has emerged as a request and concern. It was first raised
– and all designations here should be viewed as the author’s personal during ISP support at TAG during 2016 through 2021, and really in-
opinion versus having any direct or indirect impact or indication of an creased in intensity during 2022 and 2023, especially as ratings began
individual ISP’s views in terms of their contracts or other agreements to increase in their representation in government filings.
with any or all cybersecurity ratings vendors.