OSG Area Coordinators Meeting Security Team Report Mine Altunay 05/15/2013.

Slides:



Advertisements
Similar presentations
4/2/2002HEP Globus Testing Request - Jae Yu x Participating in Globus Test-bed Activity for DØGrid UTA HEP group is playing a leading role in establishing.
Advertisements

9/25/08DLP1 OSG Operational Security D. Petravick For the OSG Security Team: Don Petravick, Bob Cowles, Leigh Grundhoefer, Irwin Gaines, Doug Olson, Alain.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 04/02/2014.
INFSO-RI Enabling Grids for E-sciencE Update on LCG/EGEE Security Policy and Procedures David Kelsey, CCLRC/RAL, UK
May 9, 2008 Reorganization of the OSG Project The existing project organization chart was put in place at the beginning of It has worked very well.
Jan 2010 Current OSG Efforts and Status, Grid Deployment Board, Jan 12 th 2010 OSG has weekly Operations and Production Meetings including US ATLAS and.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Security Policy Group Summary EGI TF David Kelsey 6/28/
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Maintaining and Updating Windows Server 2008
Release & Deployment ITIL Version 3
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
Key Accomplishments and Work Plans OSG Security Team July 11, 2012.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 01/29/2014.
Maintaining a Microsoft SQL Server 2008 Database SQLServer-Training.com.
OSG Area Coordinators Meeting Operations Rob Quick 2/22/2012.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Security Policy Group EGI Technical Forum Sep 2010 David Kelsey.
CILogon OSG CA Mine Altunay Jim Basney TAGPMA Meeting Pittsburgh May 27, 2015.
OSG Area Coordinators Meeting Operations Rob Quick 2/22/2012.
OSG Area Coordinators Meeting Security Team Report Kevin Hill 08/14/2013.
OSG Security Review Mine Altunay June 19, June 19, Security Overview Current Initiatives  Incident response procedure – top priority (WBS.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 12/21/2011.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 06/25/2014.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
May 8, 20071/15 VO Services Project – Status Report Gabriele Garzoglio VO Services Project – Status Report Overview and Plans May 8, 2007 Computing Division,
OSG Security Kevin Hill. Goals Operational Security – Identify software vulnerabilities – observing the practices of our VOs and sites, and sending alerts.
Blueprint Meeting Notes Feb 20, Feb 17, 2009 Authentication Infrastrusture Federation = {Institutes} U {CA} where both entities can be empty TODO1:
JSPG: User-level Accounting Data Policy David Kelsey, CCLRC/RAL, UK LCG GDB Meeting, Rome, 5 April 2006.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 04/3/2013.
Evolution of the Open Science Grid Authentication Model Kevin Hill Fermilab OSG Security Team.
OSG Security Review Mine Altunay December 4, 2008.
Identity Management in Open Science Grid Identity Management in Open Science Grid Challenges, Needs, and Future Directions Mine Altunay OSG Security Officer.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 8/15/2012.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
OSG Cyber Security OSG Site Administrators workshop Indianapolis August Doug Olson LBNL Health.
OSG PKI Contingency and Recovery Plans Mine Altunay, Von Welch OSG Council August 23, 2012.
OSG PKI Contingency and Recovery Plans Mine Altunay, Von Welch October 16, 2012.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 11/02/2011.
Mine Altunay July 30, 2007 Security and Privacy in OSG.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 6/6/2012.
Meeting Minutes and TODOs TG has no distributed monitoring. During incident response, use a manual twiki page to distribute information TG monitors the.
US LHC OSG Technology Roadmap May 4-5th, 2005 Welcome. Thank you to Deirdre for the arrangements.
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
INFSO-RI Enabling Grids for E-sciencE EGEE SA1 in EGEE-II – Overview Ian Bird IT Department CERN, Switzerland EGEE.
Trusted Virtual Machine Images a step towards Cloud Computing for HEP? Tony Cass on behalf of the HEPiX Virtualisation Working Group October 19 th 2010.
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
OSG Site Admin Workshop - Mar 2008Using gLExec to improve security1 OSG Site Administrators Workshop Using gLExec to improve security of Grid jobs by Alain.
Security Policy: From EGEE to EGI David Kelsey (STFC-RAL) 21 Sep 2009 EGEE’09, Barcelona david.kelsey at stfc.ac.uk.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 4/11/2012.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 02/13/2012.
JSPG Update David Kelsey MWSG, Zurich 31 Mar 2009.
The OSG Stakeholders’ Request System Oct 9, 2012 Gabriele Garzoglio for the Project Office.
Identity Management in Open Science Grid Identity Management in Open Science Grid Challenges, Needs, and Future Directions Mine Altunay, James Basney,
Why a Commercial Provider should Join the Academic Cloud Federation David Blundell Managing Director 100 Percent IT Ltd Simple, Flexible, Reliable.
User Support of WLCG Storage Issues Rob Quick OSG Operations Coordinator WLCG Collaboration Meeting Imperial College, London July 7,
Opensciencegrid.org Operations Interfaces and Interactions Rob Quick, Indiana University July 21, 2005.
OSG Security: Updates on OSG CA & Federated Identities Mine Altunay, PhD OSG Security Team OSG AHM March 24, 2015.
Open Science Grid Security Activities D. Olson, LBNL OSG Deputy Security Officer For the OSG Security Team: M. Altunay, FNAL, OSG Security Officer, D.O.,
Trusted Virtual Machine Images the HEPiX Point of View Tony Cass October 21 st 2011.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 8/15/2012.
Running User Jobs In the Grid without End User Certificates - Assessing Traceability Anand Padmanabhan CyberGIS Center for Advanced Digital and Spatial.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) gLite Grid Introduction Salma Saber Electronic.
Why you should care about glexec OSG Site Administrator’s Meeting Written by Igor Sfiligoi Presented by Alain Roy Hint: It’s about security.
New OSG Virtual Organization Security Training OSG Security Team.
Software Tools Group & Release Process Alain Roy Mine Altunay.
OSG Security Review Mine Altunay March 12, Jan Security Overview Current Initiatives  OSG Security roadmap  Technical and operational.
Security Policy Update WLCG GDB CERN, 11 June 2008 David Kelsey STFC/RAL
Operations Interfaces and Interactions
OSG Security Kevin Hill.
Description of Revision
Leigh Grundhoefer Indiana University
Presentation transcript:

OSG Area Coordinators Meeting Security Team Report Mine Altunay 05/15/2013

Key Initiatives Traceability for End User Jobs without Certificates – Earlier: Created the user traceability requirements for OSG, accepted by ET Installed a frontend for the security team use and examined traceability capabilities Started working with OSG-XSEDE as the first VO to go through the assessment process. Did a security exercise with OSG-XSEDE frontend. – Since last report: Did a security exercise with Nebraska site Did another security exercise with UCSD Factory Results: site has no problem finding the pid of a malicious job. More complicated if the job has completed 3 days ago. Lack of good system level logging. Factory is capable of finding the user as long as it receives the log files

Key Initiatives Traceability – Completed the assessment of traceability of user jobs in Glideinwms System – Created a report and circulated among Glideinwms and HTCondor experts. – Findings: Glideinwms has significant traceability capabilities. At the absolute worst case (when site cannot provide any information), it can provide a finite set of users who ran jobs over a specific worker node at a given time. The worst case scenarios are 1) if the log files gets lost during transmission to factory or 2) Frontend loses Condor_History logs. The problems with lesser significance are 3) tracing pre-empted jobs and 4) having log files overwritten at the worker node. Asked resolution for the first two problems from the technical teams. With fixes in place for 1 and 2, we are confident that Glideinwms can perform sufficient levels of tracing.

Key Initiatives Traceability – Next steps: Present the assessment to broader audience. Scheduled to present at Fermilab Security Board meeting this Friday Collect feedback, analyze and integrate into the assessment.

Key Initiatives Oasis/CVMFS security assessment – Good news! Fermilab accepted the risk assessment of Oasis/CVMFS. – Allowing Fermi grid resources to connect to OSG GOC stratum 0. – Also allowing to have a stratum-1 at Fermilab to distribute the OSG repo. – One final security request is sent to GOC to satisfy Fermi security requirements.

Key Initiatives Increasing CILogon Basic CA Adoption in OSG – U of Wisconsin and CILOgon Basic provides a simple one-stop command line solution to obtain certificates. – Security team got permission and set up a test machine for Glow VO to run jobs. – Fermilab security team is on board to allow for this type of access via credentials issued by the u of wisconsin. We are waiting to hear from Glow VO whether they would like to move this to production or not. New VOs that can benefit from Cilogon are identified. CSIU and UC3. Any comments? New Work Item – Changed the VO registration process to include the security aspects. – Security team meets with new VOs upon joining OSG. – Gave training to 3 new VOs so since we implemented it. 2 more new VO are expected.

WBS Ongoing Activities 1Incident response and vulnerability assessment Minimizing the end-end response time to an incident, 1 day for a severe incident, 1 week for a moderate incident, and 1 month for a low-risk incient. 2Troubleshooting; processing security tickets including user requests, change requests from stakeholders, technical problems Goal is to acknowledge tickets within one day of receipt. 3Maintaining security scripts (vdt-update-certs, vdt-ca-manage, cert-scripts, etc) Maintain and provide bug fixes according to the severity of bugs. For urgent problems, provide an update in one week; For moderate severity, provide an update in a month; For low risk problems, provide an update in 6 months. 4XSEDE Operational Security Interface Meet weekly 5Supporting OSG RA in processing certificate requests Each certificate request is resolved within one week; requests for GridAdmin and RA Agents are served within 3 days. 6Preparing CA releases (IGTF), modifying OSG software as the changes in releases require CA release for every two months 7Security Policy work with IGTF, TAGPMA, JSPG and EGI Meet with IGTF and TAGPMA twice a year. Attend JSPG and EGI meteings remotely and face-face once a year. Track security policy changes and report to OSG management. 8Security Test and Controls Execute all the controls included in the Security Plan and prepare a summary analysis. 9 Incident Drills and Training Drill Tier3 sites 10Weekly Security Team Meeting to review work items Coordinate weekly work it ems. 11Weekly reporting to OSG-Production Report important items that will affect production; incidents, vulnerabilities, changes to PKI infrastructure 12Monthly reporting to OSG-ET Meet with ET once a month to discuss work items 13Quarterly reporting to Area Coordinator meeting Meet with area coordinators to discuss work items.

Operational Security 1.Vulnerabilities: gsi-ssh (potential to affect Oasis-login), java rmi vulnerabilities. 2.Proxy lifetime assessment. A large variety in proxy lifetimes. Conducted a risk assessment and defined the next steps. Will provide advice and tools for sites who want to enforce certain lifetimes. 3.PKI project: The Fermilab PKI project is completed and closed. OSG PKI project moving smoothly. Made some changes to Atlas’ RA Agent organization based on Atlas’ requests. 4.TAGPMA: 3 very important and welcome improvements 1.The SHA-2 due date moved to October A new lightweight profile to accredit Cilogon Basic CA under 3.Another new profile for Registration Authorities (such as OSG)