This document discusses securing the global routing system and the approaches taken by network operators. It provides examples of tools and techniques used for route origin validation, including manual lookup of IP addresses in databases to verify customer ownership, and automated checks using RPKI and RPSL. Statistics are presented on adoption of RPKI by network operators, showing the majority of prefixes have consistent origin validation, though some violations still exist. Adoption in Indonesia is reviewed, finding most autonomous systems have not yet implemented RPKI. The challenges of maintaining routing policies and implementing RPKI technologies are also summarized.