Thursday, April 27, 2006 Development of caBIG™ Security Program Presentation to Cooperative Groups Teleconference April 27, 2006 Frank J. Manion, M.S.

Slides:



Advertisements
Similar presentations
What is Business Architecture?. Overview Agility matters today more than yesterday Previous methods for managing change were designed for the needs of.
Advertisements

Module N° 4 – ICAO SSP framework
© 2012 Open Grid Forum Simplifying Inter-Clouds October 10, 2012 Hyatt Regency Hotel Chicago, Illinois, USA.
Open Grid Forum 19 January 31, 2007 Chapel Hill, NC Stephen Langella Ohio State University Grid Authentication and Authorization with.
GT 4 Security Goals & Plans Sam Meder
Course: e-Governance Project Lifecycle Day 1
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
High Performance Computing Course Notes Grid Computing.
IS 700.a NIMS An Introduction. The NIMS Mandate HSPD-5 requires all Federal departments and agencies to: Adopt and use NIMS in incident management programs.
Dr. Julian Lo Consulting Director ITIL v3 Expert
Systems Engineering in a System of Systems Context
Technical Review Group (TRG)Agenda 27/04/06 TRG Remit Membership Operation ICT Strategy ICT Roadmap.
Security Controls – What Works
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Military Technical Academy Bucharest, 2006 SECURITY FOR GRID INFRASTRUCTURES - Grid Trust Model - ADINA RIPOSAN Department of Applied Informatics.
Electronic Authentication for Flexible Learning Workshop Presentation (5 August 2003) Chris Connolly, CEO, Galexia Consulting.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
Quality evaluation and improvement for Internal Audit
Computer Security: Principles and Practice
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
FIM-ig Federated Identity Management Interest Group.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
The Evergreen, Background, Methodology and IT Service Management Model
Functional Model Workstream 1: Functional Element Development.
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
Test Organization and Management
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
MD Digital Government Summit, June 26, Maryland Project Management Oversight & System Development Life Cycle (SDLC) Robert Krauss MD Digital Government.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
Middleware Support for Virtual Organizations Internet 2 Fall 2006 Member Meeting Chicago, Illinois Stephen Langella Department of.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Enterprise Architecture, Enterprise Data Management, and Data Standardization Efforts at the U.S. Department of Education May 2006 Joe Rose, Chief Architect.
1 4/23/2007 Introduction to Grid computing Sunil Avutu Graduate Student Dept.of Computer Science.
CLARIN work packages. Conference Place yyyy-mm-dd
Geneva, Switzerland, April 2012 Introduction to session 7 - “Advancing e-health standards: Roles and responsibilities of stakeholders” ​ Marco Carugi.
Ajh January 2007 CCSDS “Books” Adrian J. Hooke CMC Meeting, Colorado Springs 26 January 2007.
NMI End-to-End Diagnostic Advisory Group BoF Fall 2003 Internet2 Member Meeting.
Grid Middleware Tutorial / Grid Technologies IntroSlide 1 /14 Grid Technologies Intro Ivan Degtyarenko ivan.degtyarenko dog csc dot fi CSC – The Finnish.
Ames Research CenterDivision 1 Information Power Grid (IPG) Overview Anthony Lisotta Computer Sciences Corporation NASA Ames May 2,
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Authors: Ronnie Julio Cole David
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
GRID Overview Internet2 Member Meeting Spring 2003 Sandra Redman Information Technology and Systems Center and Information Technology Research Center National.
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
State of Georgia Release Management Training
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
19-20 October 2010 IT Directors’ Group meeting 1 Item 6 of the agenda ISA programme Pascal JACQUES Unit B2 - Methodology/Research Local Informatics Security.
CaGrid 1.0 Security Infrastructure Stephen Langella, Scott Oster, Shannon Hastings, David Ervin, Joshua Phillips, Vinay Kumar, Tahsin Kurc, Joel Saltz.
The NIST Special Publications for Security Management By: Waylon Coulter.
Shared Services Initiative Summary of Findings and Next Steps.
Enterprise Security Program Overview Presenter: Braulio J. Cabral NCI-CBIIT/caBIG Enterprise Security Program Coordinator.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Bob Jones EGEE Technical Director
Update from the Faster Payments Task Force
Data and Applications Security Developments and Directions
Ian Bird GDB Meeting CERN 9 September 2003
Minimal Level of Assurance (LoA)
Hans Dufourmont Eurostat Unit E4 – Structural Funds
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Hans Dufourmont Eurostat Unit E4 – Structural Funds
Presentation transcript:

Thursday, April 27, 2006 Development of caBIG™ Security Program Presentation to Cooperative Groups Teleconference April 27, 2006 Frank J. Manion, M.S.

2 Overview The Federation concept Review of Security whitepaper recommendations Security Program initiative –Initiative Overview –Methodology –Challenges and open issues –Project Timeline

Identity Management and Federation - Overview Enable users to use their institution, or other certified third party, provided identity for authenticating to the Grid User should be able to authenticate to the Grid using their institution’s existing mechanisms Image taken from the caBIG Security Evaluation White Paper

4 Proposed Conceptual (“Notional”) Architecture Courtesy of Kenneth Lin, BAH

5 Federation – Virtual Organizations Span across multiple physical organizations Members are probably more interested in solving a particular problem then in who any individual works for Each physical organization probably has it’s own infrastructure The members of the VO probably do not have authority over their own physical infrastructure Definition from the Condor-Shibboleth Integration Project

6 Federation status (very) Large Federations are real and in use today –Higher-Ed InCommon –UTHSC –Federal e-Authentication Project –European Grid Initiative EGEE –Inter-Federation Federations emerging Virtual Organizations have similar status

7

Thursday, April 27, 2006 Whitepaper Recommendations

9 Security Whitepaper Technology & Architecture Recommendations Develop business-oriented security use & abuse cases –Current use cases do not reflect cancer center requirements from IRBs, Compliance Officers, Honest Brokers, CIOs, other relevant C-level execs, etc. Vet the Federated Identity Management requirements and the notional architecture –Other Identity & Access Management use cases will evolve over time from business use/abuse cases –Federation is Strategic Level Working Group requirement for caBIG™ Develop a Proof-of-Concept implementation –Test bed needed for the conceptual-level architecture Play an influential role in future security technology development –In V1 of whitepaper, highly important from business value perspective –High impact in particular in this (grid) space Consider the maturity of technologies –Consider level of funding, size of development groups, and adopter base (vertical “market” & peers)

10 Security Whitepaper Policy & Regulatory Recommendations Develop caBIG™ governance policies –Success involves multiple layers (i.e., trust, identity vetting, guidelines, data standards, SoD, firewalls, physical security, etc.) Facilitate cross-cutting policy development –Involve multiple workspaces & working groups Identify the minimum security requirements from regulatory mandates –Need comprehensive review Consider separating regulated and non-regulated environments –Mixing environments increases costs, may reduce adoption

11 Security Whitepaper Process & Execution Recommendations Create an “Independent & Integrated” cross-cutting security working group –Problems Domain workspaces currently disconnected from security implementation No consolidated security requirements across workspaces Inconsistent security message from domain workspaces Lack of resources on development team –Recommendations Establish Central security governance entity Dedicate more effort to security Consistent, consolidated design Develop a security engineering process

12 Example Security Architecture – SAFE From caBIG™ security whitepaper

Thursday, April 27, 2006 caBIG™ Security Program

14 caBIG™ Security Program Cross-cutting joint effort between Architecture, VCDE, TBPT, DSIC workspaces Pilot project to develop initial frameworks for: –Business-based use cases –Required trust anchors – agreements, policies, procedures –Security management governance infrastructure Will target the initial four caTIES adopters –Washington University, U Pitt Med.Ctr., Thomas Jefferson, U Penn Focus on involving regulatory and other “business users” at the Centers –IRB members –Compliance officers

15 caBIG™ Security Program Principal Investigators: F. Manion (FCCC), Dr. R. Crowley (UPMC), Dr. R. Robbins (FHCRC) Consultants: IRB members from UPMC/FCCC, Grid Security Experts, Federation Security expert Dr. William Weems, UTHSC Two (small) recruited working groups: –Legal, regulatory compliance, patient advocates, and bioethics –Technical, data models, vocabulary, grid security Will seek to develop framework trust agreements and define trust anchors Consequently, will develop required policy and procedure frameworks at several levels of the architecture and operational structure

16 caBIG™ Security Program Will attempt to define the requirements for the permanent security governance process Will address identity management, access control, privacy, and intellectual property issues Deliverables: –Capstone governance structure framework and documents –Includes security refinement processes –Policy and procedures sufficient to operate caTIES –Trust agreements between adopters Will not address deep details of de-identification

17 Trust Establishment & Maintenance Issues User 1 User 2 Identity & Authorization Mapping Trust Protocols Graphic from CERN Trust Operations

18 Methodology Community-based process Establish (small) cross-cutting security/technical/policy committee –IRB members, compliance officers, CIOs, etc. –Other site-specific stakeholders as required –Security/Policy/process experts on Grid/Federated security –Legal/Ethics experts –Patient advocates –VCDE, caGRID team member(s) Two working groups –Policy/Legal/Regulatory –Technical Develop high level scripted usage scenarios Policy/Legal working group interviews adopter IRB and other stakeholders for input on these scenarios & other requirements

19 Methodology - Continued Policy WG collects responses, develops business use cases and minimum set of requirements for trust Joint working group review Joint working group develops security boundary conditions, final use cases and desired future state security document –Community review –Used to inform caGRID development Policy team develops strawman trust agreements –Input from other Grids/Federations such as the IGTF, InCommon Technical team develops policies and procedures for Authentication, Authorization in major roles (for caTIES)

20 Methodology - Continued Joint Working groups develop operational Policies –Regulatory requirements, HIPAA, 21 CRF 11 –Input from best practice standards such as ITIL, ISO 17799, NIST, etc. –Other operational policies and procedures from existing grids/federations such as IGTF Joint working groups develop an initial Security Governance Framework –A recommended governance structure for security –Recommended processes for risk assessment and management –A process for on going policy and operations review involving end users and stakeholders –Requirements for external audit review & associated policies –A process for managing security incidents & events –A process for management, review, and modification of trust agreements

21 Security: What are some of the challenges? TRUST: Must cope with different management policies & procedures of different centers TRUST: Can we avoid the N^2 problem by developing a small set of federation agreements that each party certifies against? Conflicting socialogy and operating principles between different subject domains TRUST: Congruence of deep grid services and regulatory policy –Network Caches, for example – degree of risk? TRUST: Some logical and physical GRID infrastructure must persist. Implications for developing and funding hard infrastructure. Security, Resource Naming & Discovery & certain other TRUST: Certain physical infrastructure must be securely managed

22 Example Issues Policy: Management What is the governance structure of the security management program Policy: Trust Who are the right people/groups to involve in developing & maintaining trust agreements? Policy: Identity and Identity information architecture What is minimum set of attributes? What role vocabularies should be used? How is identity vetting done? What about things like “Institution” & “Project” names?

23 Example Issues Policy: Business Agreements Which Groups should provide identity and digital certificates? –Should third parties provide aspects of identity vetting and certification? Which ones? –Policy implications/tradeoffs? For which levels of trust can & should we allow campus-based certificate authorities? –If so, who certifies? Which federation bridge authorities will we need to cross certify with? What are the implications of failure to certify with certain federation bridges? –Cost/benefits?

24 Example Issues Policy: Identity Who gets to be an Identity Provider? Will all identity providers function under identical policies regarding granting and terminating access? We need policies regarding Identity Provisioning very quickly for caTIES and caGRID 1.0 –How quickly can we realistically expect these? –What do we do in the meantime? Who will set these policies - how often and under what condition will they be reviewed?

25 Example Issues Policy: Auditing & Compliance What are the minimal auditing requirements of applications? Should we treat identified data, de-identified data and non-patient related data separately? –What are the advantages and disadvantages of doing that? Security event management –What do you do if you detect that someone has accessed data that they shouldn't have? –In a federated environment, who can individuals and organizations go to if they have a concern or complaint?

26 Example Issues Policy: Technology Where are the important technology gaps? How much can we “patch” these with human processes until we have adequate technology? The security white paper evaluates very little of the security technology (CSM, CAMS, DORIAN) – i.e., what level of quality assurance is required What do we do if projects like caTIES need Virtual Organizations? How do we manage VOs?

27 Security Engineering Process   ()()

28 Security Engineering Process (cont) ()()  

29 Project Timeline 1 month – Mid June –Working groups operational –Face to face meeting to develop trial scenarios 2 months – Mid July –Security scenarios completed 3 months – Mid August –IRB interviews complete 4 months – Mid September –Governance frameworks –caTIES operating policies 4.5 months 5 months – Mid October –Operational policy frameworks –Scope/policy compliance report –Trust frameworks 6 months – Mid November –Signed trust agreements

Thursday, April 27, 2006 Identity & Authorization Management Section

32 IdAM Operating Model Courtesy of Kenneth Lin, BAH

33 Identity & Access Control Framework Courtesy of Kenneth Lin, BAH

34 caBIG V0.5 Identity Management Architecture Courtesy of Kenneth Lin, BAH

35 Authentication Notional Architecture Courtesy of Kenneth Lin, BAH

36 Authorization Notional Architecture Courtesy of Kenneth Lin, BAH

37 Proposed Conceptual (“Notional”) Architecture Courtesy of Kenneth Lin, BAH

38 Proposed Federation for Authentication Courtesy of Kenneth Lin, BAH

39 Proposed Federation for Authorization Courtesy of Kenneth Lin, BAH

40 Misc. Slides follow, no order

41 Definitions & Key Concepts (Ian Foster) 1.coordinates resources that are not subject to centralized control … A Grid integrates and coordinates resources and users that live within different control domains — for example, the user’s desktop vs. central computing; different administrative units of the same company; or different companies; and addresses the issues of security, policy, payment, membership, and so forth that arise in these settings. Otherwise, we are dealing with a local management system. 2.… using standard, open, general-purpose protocols and interfaces A Grid is built from multi-purpose protocols and interfaces that address such fundamental issues as authentication, authorization, resource discovery, and resource access. It is important that these protocols and interfaces be standard and open. Otherwise, we are dealing with an application specific system. 3. … to deliver nontrivial qualities of service. A Grid allows its constituent resources to be used in a coordinated fashion to deliver various qualities of service, relating for example to response time, throughput, availability, and security, and/or co-allocation of multiple resource types to meet complex user demands, so that the utility of the combined system is significantly greater than that of the sum of its parts. 4.Scales in a uniform manner (Manion) A Grid typically is designed so that as the need for additional services, fabric, and others resources grow, the amount of effort to add and maintain the additional resource grows approximately linearly.

42 Definitions & Key Concepts (Ian Foster) The real and specific problem that underlies the Grid concept is coordinated resource sharing and problem solving in dynamic, multi-institutional virtual organizations. –Not primarily file exchange –Rather, direct access to computers, software, data, and other resources –Required by a range of collaborative problem-solving and resource brokering strategies emerging in industry, science, and engineering. This sharing is, –necessarily, highly controlled, with –resource providers and consumers defining clearly and carefully just what is shared, who is allowed to share, and the conditions under which sharing occurs. A set of individuals and/or institutions defined by such sharing rules form what we call a virtual organization (VO).

43 Grids and Virtual Organizations Use Cases: An individual can be a member of several virtual organizations hosted on a single grid An individual can be a member of several virtual organizations hosted on several different grids.

44 Security Status of caGRID Secure communications in place Common Security Module [CSM], the Group and User Management Services [GUMS], and the Common Attribute Management System [CAMS] operational Conceptual Architecture partially defined via the caBIG Security White paper But: –Common attributes not defined –No concept of how Certificate Authorities will provide trust anchor in the Grid fabric –Applications/services defining their own security models within the application –IRBs, compliance officers, etc., not involved in requirements planning to date –No Trust Anchors in place

45 Following on the Extreme Boundary Conditions 21 CFR 11 HIPAA Public 21 CFR 11 HIPAA Public Policy Filters

46 Federated Identity Management Dorian Successor of GUMS, redesigned to address Federated Identity Management Requirement. WSRF compliant Grid service Manages user’s Grid credentials Enables users to authenticate and create grid proxies via their institution’s Identity Provider (IdP) Internal Dorian IdP allows unaffiliated users or small institutions access to the grid. Internal Certificate Authority / ability to integrate with existing Certificate Authorities Administration Interface –Configurable/Extensible User Policies –User Management –Trusted IdP Management Full Client API / Administrative Portal

47 Federated Identity Management

48 Trust Management Grid Trust Service (GTS) –WSRF Grid Service –Provides Support for Managing Trusted Certificate Authorities –Administrator register/manage certificate authorities and CRLS with GTS –Client tools synchronize Globus Trust Framework with GTS Globus is authenticating against the current trust fabric GTS Current Status –Prototype Development Almost Completed