Integrated Site Security for Grids

Slides:



Advertisements
Similar presentations
Andrew McNab - Manchester HEP - 22 April 2002 EU DataGrid Testbed EU DataGrid Software releases Testbed 1 Job Lifecycle Authorisation at your site More.
Advertisements

INFSO-RI Enabling Grids for E-sciencE Update on LCG/EGEE Security Policy and Procedures David Kelsey, CCLRC/RAL, UK
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Computer Security: Principles and Practice
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
Proposed mid-term Security Strategies for CERN Prepared by ad-hoc working group members: Lionel Cons, Francois Fluckiger, Denise Heagerty, Jan Iven, Jean-Michel.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
1 CERN’s Computer Security Challenges Denise Heagerty CERN Computer Security Officer Openlab Security Workshop, 27 Apr 2004.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
1 © 2014 Cloudera, Inc. All rights reserved. Preventing a Big Data Security Breach.
UKI ROC/GridPP/EGEE Security Mingchao Ma Oxford 22 October 2008.
Module 11: Designing Security for Network Perimeters.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Gabriela Macoveiu North-East RDA, Romania PP11 – WP responsible Cluster Policy Learning Platform WP3 Description Smarter Cluster Policies for South-East.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, EU-FP6 Project ISS e G Integrated Site Security for.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, EU-FP6 Project ISS e G Integrated Site Security for.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, 2008 See: ISS e G Integrated Site Security.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
1 I ntegrated S ite S ecurity for G rids cern.ch/isseg François Fluckiger IT seminar -EU Projects 13 March 2006 ISS e G EU-FP6 Project Overview.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
1 I ntegrated S ite S ecurity for G rids WP2 – Site Assessment Methodology, 20 June 2007 WP2 - Methodology ISS e G Integrated Site Security.
1 François Fluckiger ISS e G I ntegrated S ite S ecurity for G rids EGEE04-Pisa-25 October 2005 ISS e G Integrated Site Security for Grids EU-FP6 Project.
IS3220 Information Technology Infrastructure Security
INFSO-RI Enabling Grids for E-sciencE Joint Security Policy Group David Kelsey, CCLRC/RAL, UK 3 rd EGEE Project.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, EU-FP6 Project ISS e G Integrated Site Security for.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
StratMoS Strategic Demonstration Project for Motorways of the Sea StratMoS - An arena for cooperation.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, EU-FP6 Project ISS e G Integrated.
15-Jun-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the LCG Security Group) CERN 15 June 2004 David Kelsey CCLRC/RAL, UK
Security and resilience for Smart Hospitals Key findings
ITEC 275 Computer Networks – Switching, Routing, and WANs
Bob Jones EGEE Technical Director
WISE 2016 WISE: a global trust community where security experts share information and work together, creating collaboration among different e- infrastructures.
ISSeG Integrated Site Security for Grids WP2 - Methodology
Cybersecurity - What’s Next? June 2017
LCG Security Status and Issues
Ian Bird GDB Meeting CERN 9 September 2003
Securing the Network Perimeter with ISA 2004
LCG/EGEE Incident Response Planning
OmniRAN Introduction and Way Forward
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Paul Woods Chair, MITIGATION: Ensuring we procure cloud services taking into account of the risks involved Paul Woods Chair, ISNorthEast.
David Kelsey CCLRC/RAL, UK
IS4550 Security Policies and Implementation
Utilize Group Policy Terminal Server Settings
Office 365 Security Assessment Workshop
Strengthening our Commitment to Accountability to Beneficiaries
Guidance on Natura 2000 and Forests – Scoping Document
Strengthening our Commitment to Accountability to Beneficiaries
Leigh Grundhoefer Indiana University
Strengthening our Commitment to Accountability to Beneficiaries
Evaluation in the GEF and Training Module on Terminal Evaluations
IS4680 Security Auditing for Compliance
OmniRAN Introduction and Way Forward
Strengthening the Role of EQAVET National Reference Points
National Commission for Nuclear Activities Control
Noor Vergeer, Wojtek Kalocinski Border management and Schengen
Global One Communications
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
OU BATTLECARD: Oracle Identity Management Training
Basic Systems Management Employing Security Policies
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

Integrated Site Security for Grids ISSeG Integrated Site Security for Grids EU-FP6 Project 026745 Brief Overview Denise Heagerty, CERN 17 April 2007 Lead partner for Work Package (WP) 4 is CCLRC. Presentation by David Jackson (d.j.b.jackson@rl.c.uk) from CCLRC. Note, from 1st April 2007, CCLRC and PPARC will merge in to a new Research Council in the UK known as STFC. This should have no effect on the ISSeG project.

Integrated Site Security Concept

The ISSeG Process WP2 WP2 WP4 builds on the work in WP1, 2 and 3.

Benefits of WP2 to ISSeG Introduces requirements of other communities Based on threat analysis Tests a methodology for site assessment Targeted for Grid sites Leading to a questionnaire for self assessment Identifies differentiating factors Leading to site security categorization Provides side benefits Defines a relationship with relevant standards Identifies security improvements due to the ISS approach

Methodology for deploying ISS

D4.1: Target audiences Who is being trained? Who wants the material? Taken from figure 1 in D4.1. This was an example of how existing documentation (enisa ‘How to Raise Information Security Awareness’) was used and adapted for use in the project.

D4.1: Site and role types Time

Draft/Example Recommendations R1 Broaden the use of centralized management Centrally manage accounts Centrally manage patches and system configurations Centrally manage Internet Services Small Medium Large When dealing with ~ 10 machines, this is not a big issue. When dealing with ~ 100 machines, this starts to become an issue. With over 100 machines, it is an issue. How do to capture the attention of the audience so that they wish to read about this? The relevance of the recommendation varies with the site type (size) and the individual that has responsibility/interest what is being recommended. Not interested Interested Users Management System administrators

D4.2: Multiple routes to recommendations

Draft Recommendations (1) R1 Broaden the use of centralized management Centrally manage accounts Centrally manage patches and system configurations Centrally manage Internet Services R2 Integrate identity and resource management Provide integrated identity management Ensure resources link to the people in charge of them Define responsibilities using roles and groups R3 Manage network connectivity Restrict Intranet access to authorised devices Restrict Internet access to authorised connections Segregate networks dedicated to sensitive devices Expand the use of application gateways

Draft Recommendations (2) R4 Use security mechanisms and tools Strengthen authentication and authorisation Increase the use of vulnerability assessment tools Adapt incident detection to meet evolving trends Strengthen and promote network monitoring tools Enhance spam filter tools and mailing security Extend policy enforcement R5 Strengthen administrative procedures and training Adapt training to requirements of users, developers and system administrators Integrate security training and best practices into organisational structures Maintain administrative procedures in step with evolving security needs Extend policy regulations Regulate the use and coexistence of legacy Operating Systems

Timelines 26 Apr Peer Review Meeting Mid May Threat list sent for feedback to OSCT and community contacts End May Security assessment questionnaire sent for feedback to OSCT and community contacts 31 May CD1: Report on Peer Review Meeting (Final) 20 Jun Joint ISSeG/OSCT Meeting, Edinburgh 29 Jun CD2: Comparative analysis of requirements based on threats (top ten per community) 31 Jul CD3: Comparative auditing report comparing security at CERN, FZK and CCLRC CD4: Questionnaire for assessing new sites 15 Oct CD5: ~50 recommendations completed