EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSVG issue handling summary Dr Linda Cornwall.

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Security Vulnerabilities Dr Linda Cornwall,
Advertisements

INFSO-RI Enabling Grids for E-sciencE Update on LCG/EGEE Security Policy and Procedures David Kelsey, CCLRC/RAL, UK
INFSO-RI Enabling Grids for E-sciencE Operational Security OSCT JSPG March 2006 Ian Neilson, CERN.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI The EGI Software Vulnerability Group and EMI Dr Linda Cornwall, STFC, Rutherford.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGI-InSPIRE The EGI Software Vulnerability Group (SVG) What is a Software Vulnerability?SVG membership and interaction with other groups Most people are.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
INFSO-RI Enabling Grids for E-sciencE Incident Response Policies and Procedures Carlos Fuentes
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks From ROCs to NGIs The pole1 and pole 2 people.
The Grid Services Security Vulnerability and Risk Assessment Activity in EGEE-II Enabling Grids for E-sciencE EGEE-II INFSO-RI
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Handling Grid Security Vulnerabilities in.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks The Grid Security Vulnerability Group Dr.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks What GGUS can do for you JRA1 All hands.
EGEE is a project funded by the European Union under contract IST Testing processes Leanne Guy Testing activity manager JRA1 All hands meeting,
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Security Vulnerability Handling and.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks General relationships with EGEE JRA1 SA3.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSVG issues handling Dr Linda Cornwall CCLRC.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Middleware Deployment and Support in EGEE.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Ake Edlund EGEE Sec Head 9th MWSG meeting, SLAC,
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Next steps with EGEE EGEE training community.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks NA2 – Dissemination, Outreach and Communication.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Multi-level monitoring - an overview James.
Update on the Grid Security Vulnerability Group Linda Cornwall, MWSG7, Amsterdam 14 th December 2005
Security Vulnerabilities Linda Cornwall, GridPP15, RAL, 11 th January 2006
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Report from GGUS BoF Session at the WLCG.
INFSO-RI Enabling Grids for E-sciencE Information and Monitoring Status and Plans Plzeň, 10 July 2006 Steve Fisher/RAL.
Grid Security Vulnerability Group Linda Cornwall, GDB, CERN 7 th September 2005
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
INFSO-RI Enabling Grids for E-sciencE EGEE SA1 in EGEE-II – Overview Ian Bird IT Department CERN, Switzerland EGEE.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Dr Linda Cornwall CCLRC (RAL) FP6 Security workshop.
The Grid Security Vulnerability Group (GSVG) Enabling Grids for E-sciencE EGEE-III INFSO-RI Eliminating and Preventing.
EGEE-III INFSO-RI Enabling Grids for E-sciencE Pre-production in EGEEIII Operation principles Antonio Retico EGEE-II / EGEE II SA1.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Going from EGEE-NA ES cluster to EGI SSC.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks ROC Security Contacts R. Rumler Lyon/Villeurbanne.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Progress on first user scenarios Stephen.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Vulnerability handling, Risk management,
Security Vulnerability Identification and Reduction Linda Cornwal, JRA1, Brno 20 th June 2005
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Task tracking SA3 All Hands Meeting Prague.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Services Security Vulnerability and.
Security Vulnerability Detection and reduction Linda Cornwall MWSG, CERN 24 Feb 2005
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Patch Preparation SA3 All Hands Meeting.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks MSA3.4.1 “The process document” Oliver Keeble.
Recent lessons learned: Operational Security David Kelsey CCLRC/RAL, UK GDB Meeting, BNL, 5 Sep 2006.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks NA5: Policy and International Cooperation.
INFSO-RI Enabling Grids for E-sciencE Joint Security Policy Group David Kelsey, CCLRC/RAL, UK 3 rd EGEE Project.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks What all NGIs need to do: Helpdesk / User.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Best Practices and Use cases David Bouvet,
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud and Software Vulnerabilities Linda Cornwall, STFC 20.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security aspects (based on Romain Wartel’s.
INFSO-RI Enabling Grids for E-sciencE Operational Security Coordination Team OSCT report EGEE-4, Pisa Ian Neilson, CERN.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks NA5: Policy and International Cooperation.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Astrophysical Cluster Session Claudio Vuerli,
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks IT ROC: Vision for EGEE III Tiziana Ferrari.
EGEE-II Enabling Grids for E-sciencE EGEE and gLite are registered trademarks The Grid Security Vulnerability Group Activity in Central.
SLAs with Software Provider. Scope “…declare the rights and responsibilities between EGI.eu and the Software Provider for a particular component.” Which.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI D4.4 and the EGI review Dr Linda Cornwall 19 th Sept 2011 D4.41.
JRA1 Middleware re-engineering
Sexting case study Every case is unique, taking risk factors into consideration to aid decision making. No clear definite answers but safeguarding the.
Vulnerability Handling – experience from the October Torque issue
Ian Bird GDB Meeting CERN 9 September 2003
Grid Services Security Vulnerability and Risk Analysis
Romain Wartel EGEE08 Conference, Istanbul, 23rd September 2008
Nordic ROC Organization
Student Support Documents in practice
EGI Security Risk Assessment
TPP Standard PCS Requirements
Software Vulnerability Group Status update
Prevention is better than Cure
Presentation transcript:

EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSVG issue handling summary Dr Linda Cornwall CCLRC (RAL) JRA1 meeting, 8 th November 2006

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 2 Contents Why a talk at this meeting The vulnerability task in EGEE II Setup of the GSVG in EGEE II What we do – to first order Risk Assessments Process Effect on JRA1

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 3 Why a talk today? I talked in June 05 to JRA1 about the Pre-EGEE2 process We have changed the process for EGEE2 JRA1 people should know basically how we now operate And what effect it has on them Not repeating why a vulnerability activity is important

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 4 The Vulnerability Task in EGEE II In EGEE II there is manpower for the “Grid Services Security Vulnerability and Risk Assessment” Task The aim is “to incrementally make the Grid more secure and thus provide better availability and sustainability of the deployed infrastructure” –This is recognition that it cannot be made perfect immediately Handling of Vulnerability issues is the largest activity in this task –Which deals with specific issues

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 5 Setup of the issue handling in EGEE II The GSVG issues group in EGEE II consists of Core Group Members –Run the general process –Ensure information is passed on –1 on duty each day –At present 5 members Risk Assessment Team (RAT) –Carry out Risk Assessments –At present 8 full RAT members –Plus 4 others which confine their work to their own area of expertise RAT people are security experts, experienced system administrators, deployment experts and developers

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 6 What we do - to first order Issue is submitted –Anyone can submit an issue At least 3 RAT members carry out a Risk Assessment Target Date (TD) set according to Risk Mirror bug entered in JRA1 Savannah The issue is then in the hands of JRA1/EMT For High Risk issues EMT co-ordinates fixing the issue and the release Moderate and Low Risk issues handled by the JRA1 release process

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 7 Risk Assessments Issues divided into 4 categories of risk Extremely Critical High Moderate Low

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 8 Extremely Critical Examples Trivial compromise of core grid component Remotely exploitable issue that can lead to system compromise Root access with or without Credentials Trivial Grid Wide DoS with no Credentials Trivial use of the Grid to launch an attack on other systems with no credentials Target date – 2 Working days Alert EMT immediately Expectation – rare (we have had 1 already!)

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 9 High Risk Examples Remote exploit against middleware service Spoofing – carrying an action on someone’s behalf Exploit against MW component that gives elevated access Grid-wide DoS Information leakage which is illegal or embarrassing Target Date 3 weeks Expectation – small number

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 10 Moderate Examples Confidential issues in user information Local DoS Potentially serious, but hard to exploit problem. –E.g. hard to exploit buffer overflow Race conditions that are hard to exploit Target Date 3 months

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 11 Low Examples Small system information leak Impact on service minimal Issue that requires a combination of unlikely circumstances to exploit Issues we cannot find a direct exploit for – but fix as a precaution Note – if 2 low risk issues could produce problem, this should be entered as a higher risk issue Target Date – 6 months

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 12 Notes If anyone thinks an issue is extremely critical – all available RAT members should look at it Other than that vote – –E.g. If 3 look initially, and 2 say moderate, 1 low – set as moderate The Risk classification could change –Rise if information is available publicly or issue has been exploited –Fall if more information comes to light, e.g. part of the code not aware of mitigates problem

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 13 Issues arising from missing functionality If these are entered we will carry out risk assessment But handle differently –Inform TCG of what we consider to be the risk –But not set TD –We will allocate issue to the relevant development cluster member

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 14 Advisories Advisory on issue is partially written when the risk assessment is carried out –By the RAT members –Mostly just a few sentences –Then passed to EMT for completion Advisories available publicly on Target Date (or earlier if fix is available) Advisories should be included in the release notes Advisories should include what to do (completed by EMT/JRA1) –Solution – will need to be completed by those releasing the software –Patch/work around – which may reduce the service functionality –In worst case – advice to stop a service Advisories will not describe how to exploit issue

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 15 Process(1) Issues reported (usually by ) Then Duty Core group member - Enters issue into Grid Vulnerability Savannah Acknowledges reporter with a standard letter Sends to RAT asking for Risk Assessment

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 16 Process (2) The Risk Assessment Process is carried out by the RAT Facts are checked with appropriate developers + with reporter (if appropriate) –JRA1 leaders may be asked if we don’t know who the appropriate developers are Risk Assessment Carried out, i.e. Risk category established –at least 3 RAT members should look at each issue Advisory partially written by RAT –Into a template –Completed by JRA1/EMT Then RAT advises core group member the Risk Assessment has been carried out

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 17 Process (3) Then issue is briefly handled by core group If extremely critical – –EMT is informed immediately –OSCT informed as soon as a partially completed advisory is completed Target Date Set according to Risk –Fixed formula JRA1 Savannah mirror bug entered with TD in additional comments –Set to critical if high risk or extremely critical –Set to normal if moderate or low risk Standard mail sent to reporter informing them of the completion of the risk assessment, and the Target Date Issue allocated to JRA1/developer John White, Claudio Grandi, and Oliver Keeble informed by

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 18 Process (4) Then it is out of the GSVG hands – it is up to JRA1/EMT/SA3 to handle the issue and ensure the advisory is issued on time This includes answering further questions from the reporter –Note that the reporter should receive the advisory

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 19 Other notes We aim to carry out Risk Assessments within 2 working days of an issue being submitted We can make no guarantees, while we have more effort than prior to EGEE II effort/availability of core group people/RAT people cannot be guaranteed

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 20 Disclosure Policy for EGEE II We want to move to a responsible public disclosure policy On Target Date, information on the issue is made public –Regardless of whether a fix is available This depends on management approval, –We will ask soon

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 21 Effect on JRA1 members JRA1 members will see the mirror bug in the Savannah with Target date in the text –But no details JRA1 members may be asked to put aside what they are doing to fix a vulnerability bug Developers who need to see the details of an issue can either –Ask to be added to the Grid Vulnerability Savannah project  But don’t disclose information on the various issues in there –Or get the info from the GSVG member for their cluster

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 22 More info Started a web page at This includes a document describing the process and risk assessment strategy in more detail And why the work is important!

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 23 Questions/Discussion