Tel. (020) 2245036
Who we are
Directors and Board Members
KIXP IXP Manager
About the iCSIRT
Advisories & Alerts
Report an Incident
iCSIRT is the Industry Computer Security and Incident Response Team (iCSIRT) for TESPOK. We work closely with the Information Security community to detect, report and investigate incidents that pose a threat to the security of our members’ information systems. We also investigate other forms of network abuse such as spam, phishing, host compromises, denial-of-service attacks and host vulnerabilities. Information security threats are not limited to particular networks or national boundaries, and we work with other CSIRTs across the world to manage and resolve incidents. We have built strong relationships with other security researchers and sources of security reports to ensure we provide you with a fast and effective response.
Our mission is to safeguard the current and future network security of TESPOK and of our peering members, enabling a secure environment for online activities. Our primary function is to monitor and resolve any security incidents that occur on the TESPOK member network, with specialists tracking a range of platforms, including Unix, Linux and Windows.
Services are offered to peering member ISPs as the official constituency, with shared authority, through their respective Security Points of Contact. Due to the geographical scope of incidents, we assist other organizations and agencies in their investigations, connecting them to our trusted security points of contacts within the community.
Policies and Procedures
The iCSIRT offers services using security policies and procedures put in place for the Kenya Internet Exchange Point, relevant security policies from the peering ISPs and industry-wide Information Security best practices. The main form of incident reporting is by email to icsirt(at)tespok.co.ke. The level of support and collaboration with other external CSIRTs depends on type and criticality of incident reported by constituencies. Collaboration with other 3rd parties such as subject matter experts or law enforcement depends on the type of incident reported and its complexity.