Some thoughts on BCOP TF objectives.
The current statements of BCOP TF Charter and activities do not make 
distinctions between Practices that are good for the Internet (mutually 
beneficial) and Practices that are good recommendations for the 
individual Operator (altruistic).  MANRS clearly sits in the former, but 
does contain some altruistic recommendations also.
I suggest that the BCOP TF charter should be clarified to state clearly 
whether its scope is solely BCOPs that are mutually beneficial.  There 
seem to me to be a lot of opportunities for more altruistic output, but 
these are not being discussed.
I happen to be employed by Arbor Networks so I hear a lot about bad 
things that happen across the Internet.
Considerations for BCOPs that could be worked on:
  * Amplification attacks.  Avoid being an Amplifier.  Do not respond to
    connectionless service requests from outside of your own address
    space.  DNS, NTP, Chargen...  Configure your servers and ingress
    filters accordingly. (mutually beneficial)
  * For Internet Access providers, consider offering, as the default
    entry level Internet Access Service, something which does not allow
    external DNS / NTP resolution, to limit some of the methods
    available to 'malware' that gets on to consumer systems. (mutually
    beneficial)
  * Implement a separate network for monitoring and managing your
    network.  Otherwise, a large traffic anomaly, like a DoS attack, may
    flood your internal links and make your network invisible and
    uncontrollable.  A physically separate network is best because
    virtual networks have to have classifiers that decide the
    priority/VLAN for arriving traffic and these can also be overwhelmed
    by large anomalies, with the same bad results. (altruistic)
  * When acquiring routers and networking equipment, pay attention to
    the need to monitor.  Can a new device generate flow reports and
    process SNMP requests at useful rates without impairing your
    forwarding performance below the level you need?  Be prepared for
    exceptional packet rates, not just bit rates. (altruistic)
  * Discuss Flowspec opportunities with your peers and transit providers
    to give yourself as many opportunities as possible for traffic
    engineering to achieve mitigation. (altruistic)
  * Customer contracts and DoS attacks.  Make it clear that the customer
    is contracting to receive a limited amount of bandwidth (and packet
    rate).  If they attract a higher rate of traffic, the ISP will HAVE
    to drop some traffic randomly, and may need to drop all traffic to
    protect its other customers.  Consider offering mitigation services
    to customers that wish to protect themselves against these
    incidents.  (altruistic)
  * Customers that have totally free access to the Internet represent
    additional risk to you, the ISP.  For customers that want the full
    experience, cover your additional risk mitigation costs. (altruistic)
Regards
Steve