Aspects of application security Jens Jensen, STFC 3 rd T&S workshop, NeSC 08-09 July 2008.

Slides:



Advertisements
Similar presentations
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing Xinwen Zhang Francesco Parisi-Presicce Ravi Sandhu
Advertisements

© 2012 Open Grid Forum Simplifying Inter-Clouds October 10, 2012 Hyatt Regency Hotel Chicago, Illinois, USA.
VO Support and directions in OMII-UK Steven Newhouse, Director.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
Security Q&A OSG Site Administrators workshop Indianapolis August Doug Olson LBNL.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
Technical Issues with Establishing Levels of Assurance Zephyr McLaughlin Lead, Security Middleware Computing & Communications University of Washington.
Computer Security Workshops Security Introduction, Central Principles and Concepts.
Andrew McNab - EDG Access Control - 14 Jan 2003 EU DataGrid security with GSI and Globus Andrew McNab University of Manchester
Supporting education and research E-learning tools, standards and systems Sarah Porter Head of Development, JISC.
Authorization WG Update David Kelsey EU Grid PMA, Copenhagen 27 May 2008.
Open Workshop on e-Infrastructures, Helsinki October 4 – 5, 2006 Roadmap Parallel Session on last chapter of e-IRG Roadmap: Crossing the Boundaries of.
CoreGRID Workpackage 5 Virtual Institute on Grid Information and Monitoring Services Authorizing Grid Resource Access and Consumption Erik Elmroth, Michał.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Towards Cloud Federations: what we have; what we want OGF 31, Taipei Cloud security session Jens Jensen Science and Technology Facilities Council Rutherford.
Identity Management, what does it solve By Gautham Mudra.
The Business of Identity Management Barry R. Ribbeck Director Systems Architecture & Infrastructure Rice University
Federated A(A(A))I Jens Jensen hepsysman, RAL,
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Report from Breakout Session 1.2 Secure Consumerization: the Genuine Trustworthiness Revolution Chair: Craig Lee Rapporteur: Paolo Mazzetti.
Dr. Raimund Ege: Research Summary  Security in the Mobile Context Trust and Access control models Peer-to-peer delivery networks  Opportunities for student.
1 Multi Cloud Navid Pustchi April 25, 2014 World-Leading Research with Real-World Impact!
Presented by Amlan B Dey.  Access control is the traditional center of gravity of computer security.  It is where security engineering meets computer.
SOS EGEE ‘06 GGF Security Auditing Service: Draft Architecture Brian Tierney Dan Gunter Lawrence Berkeley National Laboratory Marty Humphrey University.
Security considerations for mobile devices in GoRTT
Federated Identity Management for HEP David Kelsey WLCG GDB 9 May 2012.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
Usable Security for Science Challenges and Next Steps Jens Jensen Science and Technology Facilities Council Trust and Security 2 nd Workshop Oxford 8-9.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
Virtual Workspaces Kate Keahey Argonne National Laboratory.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Jens G Jensen CCLRC e-Science Single Sign-on to the Grid Authentication and Integrated Identity Management HEPiX, CASPUR, Rome 3-7 April 2006.
Athens – integrated AMS services Ed Zedlewski JISC/CNI Conference Edinburgh, June 2002.
Manish Mehta, CS 590L Authentication Services in Open Grid Services by Manish Mehta April 27, 2004.
GRID Overview Internet2 Member Meeting Spring 2003 Sandra Redman Information Technology and Systems Center and Information Technology Research Center National.
Conference name Company name INFSOM-RI Speaker name The ETICS Job management architecture EGEE ‘08 Istanbul, September 25 th 2008 Valerio Venturi.
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
Authentication and Authorisation for Research and Collaboration Licia Florio AARC Workshop The AARC Project Brussels, 26 October.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE September Integrating Policy with Applications.
Globus and PlanetLab Resource Management Solutions Compared M. Ripeanu, M. Bowman, J. Chase, I. Foster, M. Milenkovic Presented by Dionysis Logothetis.
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
Standards driven AAA for Job Management within the OMII-UK distribution Steven Newhouse Director, OMII-UK
CS223: Software Engineering Lecture 2: Introduction to Software Engineering.
AAI Developments AAI for e-infrastructures UK T0 workshop, Milton Hill Park October 2015
Security Policy: From EGEE to EGI David Kelsey (STFC-RAL) 21 Sep 2009 EGEE’09, Barcelona david.kelsey at stfc.ac.uk.
Security Policy Update WLCG GDB CERN, 14 May 2008 David Kelsey STFC/RAL
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
© Copyright AARNet Pty Ltd PRAGMA Update & some personal observations James Sankar Network Engineer - Middleware.
A. Candiello, INFN New industry perspectives emerging from the EGI model dr. Antonio Candiello INFN/IT, 39 Countries (NGIs)
Federated Identity Management for Scientific Collaborations The Common Vision David Kelsey (STFC) 3 Nov 2011.
Planning for LCG Emergencies HEPiX, Fall 2005 SLAC, 13 October 2005 David Kelsey CCLRC/RAL, UK
Shibboleth Use at the National e-Science Centre Hub Glasgow at collaborating institutions in the Shibboleth federation depending.
Security Bob Cowles
Security and Delegation The Certificate Perspective Jens Jensen Rutherford Appleton Laboratory Workshop at NIKHEF, 27 April 2010.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) gLite Grid Introduction Salma Saber Electronic.
Open Science Grid Consortium Meeting
Grid Security.
LCG/EGEE Incident Response Planning
Grid Computing.
Gonçalo Borges, Mário David, Jorge Gomes
Federated Identity Management for Scientific Collaborations
April 17, 2009 eGov Workshop: Cloud Computing and Interoperability Daniel Burton Senior Vice President Global Public Policy Salesforce.com.
Presentation transcript:

Aspects of application security Jens Jensen, STFC 3 rd T&S workshop, NeSC July 2008

Contents Why Who needs it Where do we need it What is it and what do we need What do we have already? How do we do it?

Why Apps Security Data is precious, or confidential Work is confidential Result is expensive, or confidential Resources are expensive Applications (or libraries) are restricted Compliance with regulations

Who needs it (stakeholders)‏ Data owner, controller Application owner Resource owner Funding body

Where? Grid? Clouds? Distributed computing? Desktop? From my perspective: –All of the above (probably)‏

Paranoid calculation... fE(d)=Ef(d)‏ or fE(d)=E'f(d)‏Linear E

manageability Science Apps IDs attrs fabric data results infra mware time social usability availability users admins authorities

Old Chestnuts Security in depth Consistency (across data replicas)‏ Also at application level (how to unlock the data)‏ –Legacy apps conversion –Unlocking data with legacy apps Secure programming Trust

Applications – APIs APIs –Web services –Grid –Cloud –Local –RPC Fine grained access control (architecture?)‏ Auditing Protecting data Trust in result

Access to Apps Licensing –License managers Commercial vs academic Payment and subscription models –Sustainability of service

Trust in Attribute Authorities Attributes authorise access to resources An attribute authority issues attributes for users How do you know it can be trusted? Do you understand what it says? Is it protected? What are best practices?

Building blocks Long term signatures –Maintained against time –Changing identities –Changing crypto (vulnerabilities, apps support)‏ Algorithms

Trust in Service Provider Cloud model and grid model –Using remote resources, provided by ext'l provider Calling API Uploading apps Different security aspects

Accounting Account for resource usage –By user, VO –Currently wallclock, CPU Available (to user? VO? others?)‏

Environment Sandboxes Restricting what students can do Runaway jobs Leftovers from previous jobs WLCG: Jobs running other jobs (or forking)‏ Jobs pulling in apps Jobs changing UID

Interoperability Standards are important –That's why there are so many to choose from... Interoperation between Grids –Don't throw the baby out with the bathwater Interoperability is important –Work within (or hook into) users' infrastructure

Levels of Assurance Part of Trust –Authentication –Issuing authorities (identity, credentials, attrs)‏ –Consider security workflows People seem to consider this solved

Existing work How far does existing work go? Is it useful/usable? Do they work together? Do they meet the needs?

Existing work Lots known about local security –Applications running locally –But is isn't easy –And local systems are often “trusted” Lots known about secure programming –But many programmers are scientists

Existing Work (examples)‏ caBIG (US cancer research)‏ –Validation service, central trust service XtreemOS (EU funded secure OS)‏ IGTF work on trusted authorities –Policies –Best practices for operation

Existing work (examples)‏ Policies –JSPG (EGEE)‏ Dynamic agreements –“Concertation”, “Orchestration” –TrustCoM, GridTrust Measure trust in projects –AssessGrid – WS-Agreement (OGF std)‏

Adapting Apps Adaptation libraries? Can't tweak closed source OS level (cf. GEMLCA)‏ Changing code –Often done to make distributed –Gridifying is (often) not (much) harder Reuse is often difficult or expensive

Rethinking running apps Use TPM? Consider escrowed data? Running signed applications (like Java)‏ Trusted in service providers? (clouds, grids)‏ –“You can safely store your passwords with us” –Banks do something like this

Identify the tradeoffs Security vs usability Security vs performance Revealing information: to service provider (AUP), to VO (e.g. quotas), to other users (coordination, sharing)‏

“Paranoid” users Run apps on their own closed resources Do they want to change that? No. Do we want to change that? ?? What is to gain? –Interoperability –Improved security of existing resources

The role of deception Users –Run fake jobs Service providers –Honey pots Is there a role for deception? Consumes resources

How do we do it, then? What are the requirements What do we have and how does it fit? Fill in the gaps –Industry interest?‏ –Juicy research topics? Who will/should benefit Make it easy for apps writers/porters Most effective way to make progress

How do we do it? Understand the risks –E.g. you secure your data but the user takes it home on a laptop –... or sells it to your competitor –Risk management framework –Help sell secure grid (or cloud) services

How do we do it then? Trust requires special attention –Are current policies sufficient? –Can we test or audit trusted components? –How do we convince the end user? –Rewards/penalities

How do we do it then? Overcome the “security is hard” attitude –“We'll add it in later” –Locate a hole, e.g. data integrity or confidentiality –Demonstrate? Don't put them off...

Which apps “most” need security? Apps with data security requirements –Permit workflow => security in depth Service provider –Calling external API => Trust Instruments –!!! => Flexible, manageable access control