15-Jun-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the LCG Security Group) CERN 15 June 2004 David Kelsey CCLRC/RAL, UK

Slides:



Advertisements
Similar presentations
Grid Security Policy GridPP18, Glasgow David Kelsey 21sr March 2007.
Advertisements

5-Dec-02D.P.Kelsey, GridPP Security1 GridPP Security UK Security Workshop 5-6 Dec 2002, NeSC David Kelsey CLRC/RAL, UK
INFSO-RI Enabling Grids for E-sciencE Update on LCG/EGEE Security Policy and Procedures David Kelsey, CCLRC/RAL, UK
5-Sep-02D.P.Kelsey, Security Summary, Budapest1 WP6/7 Security Summary Budapest 5 Sep 2002 David Kelsey CLRC/RAL, UK
30-Jan-03D.P.Kelsey, GridPP Security1 Security GridPP6 30 Jan 2003 Coseners House David Kelsey CLRC/RAL, UK
Authentication Policy David Kelsey CCLRC/RAL 15 April 2004, Dublin
3 Dec 2003Market Operations Standing Committee1 Market Rule and Change Management Consultation Process John MacKenzie / Darren Finkbeiner / Ella Kokotsis,
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
13-May-03D.P.Kelsey, WP8 CA and VO organistion1 CA’s and Experiment (VO) Organisation WP8 Meeting EDG Barcelona, 13 May 2003 David Kelsey CCLRC/RAL, UK.
12-May-03D.P.Kelsey, SCG Online Authentication1 Online Authentication SCG Meeting EDG Barcelona, 12 May 2003 David Kelsey CCLRC/RAL, UK
EGEE ARM-2 – 5 Oct LCG Security Coordination Ian Neilson LCG Security Officer Grid Deployment Group CERN.
INFSO-RI Enabling Grids for E-sciencE SA1: Cookbook (DSA1.7) Ian Bird CERN 18 January 2006.
GGF12 – 20 Sept LCG Incident Response Ian Neilson LCG Security Officer Grid Deployment Group CERN.
LCG/EGEE Security Update HEPiX, Fall 2004 BNL, 18 October 2004 David Kelsey CCLRC/RAL, UK
Deployment Issues David Kelsey GridPP13, Durham 5 Jul 2005
JSPG: User-level Accounting Data Policy David Kelsey, CCLRC/RAL, UK LCG GDB Meeting, Rome, 5 April 2006.
Security Area in GridPP2 4 Mar 2004 Security Area in GridPP2 “Proforma-2 posts” overview Deliverables – Local Access – Local Usage.
INFSO-RI Enabling Grids for E-sciencE EGEE/LCG Joint Security Policy Group David Kelsey, CCLRC/RAL, UK EGEE.
10-Jun-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security (Report from the LCG Security Group) CERN, 10 June 2003 David Kelsey CCLRC/RAL, UK
Security Policy Update LCG GDB Prague, 4 Apr 2007 David Kelsey CCLRC/RAL
13-Jul-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the Joint LCG/EGEE Security Group) CERN 13 July 2004 David Kelsey CCLRC/RAL,
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
9-Sep-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security (Report from the LCG Security Group) CERN, 9 September 2003 David Kelsey CCLRC/RAL, UK
Training and Dissemination Enabling Grids for E-sciencE Jinny Chien, ASGC 1 Training and Dissemination Jinny Chien Academia Sinica Grid.
23-Oct-03D.P.Kelsey, LCG Security Update, HEPiX1 LCG Security Update HEPiX-HEPNT, TRIUMF, 23 October 2003 David Kelsey CCLRC/RAL, UK
8-Jul-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security (Report from the LCG Security Group) RAL, 8 July 2003 David Kelsey CCLRC/RAL, UK
10-May-01D.P.Kelsey, Security Workshop Summary1 DataGrid Security Workshop 29/30 March 2001 SUMMARY David Kelsey CLRC/RAL, UK
Security Vulnerabilities Linda Cornwall, GridPP15, RAL, 11 th January 2006
3-Jul-02D.P.Kelsey, Security1 Security meetings Report to EDG PTB 3 Jul 2002 David Kelsey CLRC/RAL, UK
JRA Execution Plan 13 January JRA1 Execution Plan Frédéric Hemmer EGEE Middleware Manager EGEE is proposed as a project funded by the European.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
LCG/EGEE Security Operations HEPiX, Fall 2004 BNL, 22 October 2004 David Kelsey CCLRC/RAL, UK
15-Dec-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the Joint Security Policy Group) CERN 15 December 2004 David Kelsey CCLRC/RAL,
Grid Deployment Board – 10 February GD LCG Workshop Goals Give overview where we are Stimulate cooperation between the centres Improve the communication.
9-Oct-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security (Report from the LCG Security Group) FNAL 9 October 2003 David Kelsey CCLRC/RAL, UK
Grid Security Vulnerability Group Linda Cornwall, GDB, CERN 7 th September 2005
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
Security Policy Update David Kelsey UK HEP Sysman, RAL 1 Jul 2011.
Security Operations David Kelsey GridPP Deployment Board 3 Mar 2005
A Trust Framework for Security Collaboration among Infrastructures David Kelsey (STFC-RAL, UK) WLCG GDB, CERN 10 Jul 2013.
2-Sep-02D.P.Kelsey, WP6 CA, Budapest1 WP6 CA report Budapest 2 Sep 2002 David Kelsey CLRC/RAL, UK
Security Vulnerability Identification and Reduction Linda Cornwal, JRA1, Brno 20 th June 2005
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
Security Policy: From EGEE to EGI David Kelsey (STFC-RAL) 21 Sep 2009 EGEE’09, Barcelona david.kelsey at stfc.ac.uk.
Security Policy Update WLCG GDB CERN, 14 May 2008 David Kelsey STFC/RAL
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
EGI-InSPIRE RI EGI EGI-InSPIRE RI Service Operations Security Policy the new generalised site operations security policy.
Security EGEE/SA1 ROC Managers ARM-3 meeting Lyon, 17 March 2005 David Kelsey CCLRC/RAL, UK
EGEE ARM-2 – 5 Oct LCG/EGEE Security Coordination Ian Neilson Grid Deployment Group CERN.
8-Mar-01D.P.Kelsey, Certificates, WP6, Amsterdam1 WP6: Certificates for DataGrid Testbeds David Kelsey CLRC/RAL, UK
JSPG Update David Kelsey MWSG, Zurich 31 Mar 2009.
12-Jun-03D.P.Kelsey, CA meeting1 CA meeting Minimum Requirements CERN, 12 June 2003 David Kelsey CCLRC/RAL, UK
18-May-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the LCG Security Group) Barcelona 18 May 2004 David Kelsey CCLRC/RAL, UK
Planning for LCG Emergencies HEPiX, Fall 2005 SLAC, 13 October 2005 David Kelsey CCLRC/RAL, UK
INFSO-RI Enabling Grids for E-sciencE Joint Security Policy Group David Kelsey, CCLRC/RAL, UK 3 rd EGEE Project.
7-May-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Issues and Planning or Report from the Security Group CERN, 8 May 2003 David Kelsey CCLRC/RAL, UK.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security aspects (based on Romain Wartel’s.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Grid Deployment Technical Working Groups: Middleware selection AAA,security Resource scheduling Operations User Support GDB Grid Deployment Resource planning,
Grid Security Policy: EGEE to EGI David Kelsey (RAL) 16 Sep 2009 JSPG meeting, DFN Berlin david.kelsey at stfc.ac.uk.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
INFSO-RI Enabling Grids for E-sciencE Update on LCG/EGEE Security Policy and Procedures David Kelsey, CCLRC/RAL, UK
Security Policy Update WLCG GDB CERN, 11 June 2008 David Kelsey STFC/RAL
David Kelsey CCLRC/RAL, UK
JRA3 Introduction Åke Edlund EGEE Security Head
LCG Security Status and Issues
David Kelsey CCLRC/RAL, UK
Ian Bird GDB Meeting CERN 9 September 2003
David Kelsey CCLRC/RAL, UK
Integrated Site Security for Grids
Presentation transcript:

15-Jun-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the LCG Security Group) CERN 15 June 2004 David Kelsey CCLRC/RAL, UK

15-Jun-04D.P.Kelsey, LCG-GDB-Security2 Overview Joint (LCG) Security Group meetings –19 May & 4 June 2004 –Next meeting: 1 July 2004 Security warning LCG expansion concerns Policy documents –New Guide to Application & Network security CA approval procedures EGEE Site Security requirements Summary

15-Jun-04D.P.Kelsey, LCG-GDB-Security3 LCG Security warning Growing interest in Grid –TeraGrid attack –Article in New Scientist magazine (22 May) “Hacking the Grid” –Talk at 2600 hacker conference (9-11 July) An attack is inevitable! All sites need to be aware Keep each other informed –via the Security Contacts list Follow LCG Incident Response procedures –Important role for GOC Warning sent to all security contacts on 10 th June Planning to test security as part of LCG service challenges

15-Jun-04D.P.Kelsey, LCG-GDB-Security4 Concerns re LCG expansion LCG is now very large All new sites receive the security policy documents There is a mail list to ask questions –But very little use! Tier1 security contacts are usually the official site security officer –Tier2 contacts are more often local to the resource Tier1 managers are present in GDB –Tier2 managers often are not Do all LCG sites understand their responsibilities? We are starting to consider a Site Registration process –E.g. sign agreement to policy documents? All very important for incident response

15-Jun-04D.P.Kelsey, LCG-GDB-Security5 Guide to LCG Application & Network Security The final document in the policy and procedures set V1.4 (7 th June) now ready for GDB comment Main author: Ian Neilson (LCG Security Officer) Aim –It is a Guide and not Policy –Guide choices in design, planning and deployment of LCG Grid services –Identify key areas of best practice BUT, it contains important recommendations for deploying a secure production Grid –Important for GDB to approve the Guide

15-Jun-04D.P.Kelsey, LCG-GDB-Security6 Guide: Application and Service Development LCG expects development processes that –Support adequate and documented treatment of security E.g. Current misalignment –IP connectivity from anywhere to anywhere –Incoming: weakens site –Outgoing: distributed DOS Current firewall requirements in Appendix B –LCG Security Group considers these inappropriate for a production Grid –Application developers MUST NOT rely on the current settings – not a minimal set

15-Jun-04D.P.Kelsey, LCG-GDB-Security7 Some recommendations (development) Design and development process Coding practice Communications security –Authentication –Encryption –Use existing protocols Functional security –Authorization –Degrade and fail gracefully –Logging –Avoid leakage of information

15-Jun-04D.P.Kelsey, LCG-GDB-Security8 Application and Service Deployment LCG expects security instructions in documentation Evaluate risks Establish clear network access control policy Apply configuration management and automate Keep systems patched for security updates Configure and retain audit logs

15-Jun-04D.P.Kelsey, LCG-GDB-Security9 CA approval procedures Current process takes too long –All new CAs or any changes need GDB approval Takes 2 weeks Experience shows there has been no discussion –CA details currently linked to LCG releases EU Grid PMA now exists –EGEE will use all CAs approved by the PMA Proposed new streamlined LCG process –Accept the EU Grid PMA approved list –Release CA rpms independently on LCG releases –But NOT mandatory on all sites during a 2 week period of discussion –Any additional CAs still follow the existing procedure

15-Jun-04D.P.Kelsey, LCG-GDB-Security10 EGEE Site Security Requirements The Joint Security Group has been asked to submit a list of Top 10 site requirements –For discussion at the EGEE Middleware Security Group Meeting (16-17 June) A draft list has been prepared – sent to the LCG site security contacts (8 June) Just two responses to date –Consider use of SELinux –List of some known security problems today The Network and Applications Security Guide and the GGF Site AAA requirements guide are also important input

15-Jun-04D.P.Kelsey, LCG-GDB-Security11 “Top 10” security requirements (middleware) Sites in control of local security policy Audit/track at individual user level Sites control local AuthZ policy Authorize, limit or forbid IP connectivity Hooks/logging for intrusion detection Consistent and appropriate audit logs Development and deployment of secure middleware Able to cope with distributed AuthZ (user, VO, site) Shutdown and restart services gracefully Robust VO and user registration tools (procedures)

15-Jun-04D.P.Kelsey, LCG-GDB-Security12 Summary GDB is invited to Either now or by –Discuss and approve the Application and Network Security Guide –Comment on new CA approval process –Comment on EGEE Site Security Requirements –Consider how to improve the integration of Tier 2 sites as LCG expands