EGEE-III INFSO-RI-222667 Enabling Grids for E-sciencE www.eu-egee.org EGEE and gLite are registered trademarks Grid Security Vulnerability Handling and.

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Security Vulnerabilities Dr Linda Cornwall,
Advertisements

INFSO-RI Enabling Grids for E-sciencE Update on LCG/EGEE Security Policy and Procedures David Kelsey, CCLRC/RAL, UK
INFSO-RI Enabling Grids for E-sciencE Operational Security OSCT JSPG March 2006 Ian Neilson, CERN.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI The EGI Software Vulnerability Group and EMI Dr Linda Cornwall, STFC, Rutherford.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGI-InSPIRE The EGI Software Vulnerability Group (SVG) What is a Software Vulnerability?SVG membership and interaction with other groups Most people are.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks gLite Release Process Maria Alandes Pradillo.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
INFSO-RI Enabling Grids for E-sciencE Incident Response Policies and Procedures Carlos Fuentes
The Grid Services Security Vulnerability and Risk Assessment Activity in EGEE-II Enabling Grids for E-sciencE EGEE-II INFSO-RI
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Handling Grid Security Vulnerabilities in.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks The Grid Security Vulnerability Group Dr.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSVG issues handling Dr Linda Cornwall CCLRC.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Middleware Deployment and Support in EGEE.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Ake Edlund EGEE Sec Head 9th MWSG meeting, SLAC,
Security Policy Update LCG GDB Prague, 4 Apr 2007 David Kelsey CCLRC/RAL
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
Training and Dissemination Enabling Grids for E-sciencE Jinny Chien, ASGC 1 Training and Dissemination Jinny Chien Academia Sinica Grid.
INFSO-RI Enabling Grids for E-sciencE SA1 and gLite: Test, Certification and Pre-production Nick Thackray SA1, CERN.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Operations Automation Team James Casey EGEE’08.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Multi-level monitoring - an overview James.
Update on the Grid Security Vulnerability Group Linda Cornwall, MWSG7, Amsterdam 14 th December 2005
Security Vulnerabilities Linda Cornwall, GridPP15, RAL, 11 th January 2006
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Linda Cornwall CCLRC (RAL) FP6 Security workshop.
Grid Security Vulnerability Group Linda Cornwall, GDB, CERN 7 th September 2005
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
INFSO-RI Enabling Grids for E-sciencE EGEE SA1 in EGEE-II – Overview Ian Bird IT Department CERN, Switzerland EGEE.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Dr Linda Cornwall CCLRC (RAL) FP6 Security workshop.
The Grid Security Vulnerability Group (GSVG) Enabling Grids for E-sciencE EGEE-III INFSO-RI Eliminating and Preventing.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Using GStat 2.0 for Information Validation.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks ROC Security Contacts R. Rumler Lyon/Villeurbanne.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Progress on first user scenarios Stephen.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Security Threat Risk Assessment Dr Linda Cornwall Rutherford Appleton.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Vulnerability handling, Risk management,
Security Vulnerability Identification and Reduction Linda Cornwal, JRA1, Brno 20 th June 2005
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Services Security Vulnerability and.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Standard network trouble tickets exchange.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Update Authorization Service Christoph Witzig,
Additional Services: Security and IPv6 David Kelsey STFC-RAL.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks User traceability and log analysis tools.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Communication tools between Grid Virtual.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks The EGEE User Support Infrastructure Alistair.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Operations Automation Team Kickoff Meeting.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Ian Bird All Activity Meeting, Sofia
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Patch Preparation SA3 All Hands Meeting.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks MSA3.4.1 “The process document” Oliver Keeble.
INFSO-RI Enabling Grids for E-sciencE gLite Test and Certification Effort Nick Thackray CERN.
Recent lessons learned: Operational Security David Kelsey CCLRC/RAL, UK GDB Meeting, BNL, 5 Sep 2006.
INFSO-RI Enabling Grids for E-sciencE Joint Security Policy Group David Kelsey, CCLRC/RAL, UK 3 rd EGEE Project.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks What all NGIs need to do: Helpdesk / User.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud and Software Vulnerabilities Linda Cornwall, STFC 20.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security aspects (based on Romain Wartel’s.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid is a Bazaar of Resource Providers and.
INFSO-RI Enabling Grids for E-sciencE Operational Security Coordination Team OSCT report EGEE-4, Pisa Ian Neilson, CERN.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Astrophysical Cluster Session Claudio Vuerli,
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GOCDB4 Gilles Mathieu, RAL-STFC, UK An introduction.
15-Jun-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the LCG Security Group) CERN 15 June 2004 David Kelsey CCLRC/RAL, UK
EGEE-II Enabling Grids for E-sciencE EGEE and gLite are registered trademarks The Grid Security Vulnerability Group Activity in Central.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSVG issue handling summary Dr Linda Cornwall.
JRA1 Middleware re-engineering
Vulnerability Handling – experience from the October Torque issue
EGI Software Vulnerability Group (SVG) report to CSIRT F2F
Ian Bird GDB Meeting CERN 9 September 2003
Grid Services Security Vulnerability and Risk Analysis
Romain Wartel EGEE08 Conference, Istanbul, 23rd September 2008
EGI Security Risk Assessment
Prevention is better than Cure
Presentation transcript:

EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Security Vulnerability Handling and Risk Management Linda Cornwall EGEE’08 Conference, th September 2008, Istanbul, Turkey

Enabling Grids for E-sciencE EGEE-III INFSO-RI Reducing Security Risk 2 Contents Summarize the EGEE strategy for handling and preventing Grid Security Vulnerabilities Provide a status update Describe plans for a General Security Risk Assessment to be led by the Security Co-ordination Group (SCG) Hopefully leading to increased trust and confidence in the security of the deployed infrastructure from all parties

Enabling Grids for E-sciencE EGEE-III INFSO-RI Reducing Security Risk 3 The Grid Security Vulnerability Group (GSVG) Started in EGEE-II, continuing in EGEE-III “The Purpose of the Grid Security Vulnerability Group is to eliminate Grid Security Vulnerabilities from the software, and prevent new ones being introduced. The aim is to provide a high level of confidence in the security of the deployed infrastructure, thus reducing the risk of incidents.” Largest part of the work is the handling of specific Grid Security Vulnerability issues as they are found

Enabling Grids for E-sciencE EGEE-III INFSO-RI Reducing Security Risk 4 People involved in GSVG issue handling Linda Cornwall, Stephen Burke (RAL, UK) Vincenzo Ciaschini (INFN, Italy) Ákos Frohner, Maarten Litmaath, Romain Wartel (CERN) Oscar Koeroo (NIKHEF, Holland) Daniel Kouril (CESNET, Czech Republic) Kálmán Kővári (KFKI-RMKI, Hungary) Eygene Ryabinkin (RRC-KI, Russia) Åke Sandgren (HPC2N, Sweden) John Walsh (TCD, Ireland )

Enabling Grids for E-sciencE EGEE-III INFSO-RI Reducing Security Risk 5 GSVG Issue handling summary This was established and approved in EGEE-II Anyone may report an issue –By ing to –By entering in the GSVG savannah  Note that bugs are private so cannot be read except by members of this savannah project The Risk Assessment Team (RAT) investigates the issue, if valid carries out a Risk Assessment

Enabling Grids for E-sciencE EGEE-III INFSO-RI Reducing Security Risk 6 Risk Assessments RAT investigates the problem and discusses the risk Each valid issue is placed in 1 of 4 risk categories –Extremely Critical –High –Moderate –Low Target Date for resolution set according to risk –EC – 2 days –High – 3 weeks –Moderate – 3 months –Low – 6 months. This allows for the prioritization and timely resolution of vulnerabilities

Enabling Grids for E-sciencE EGEE-III INFSO-RI Reducing Security Risk 7 Disclosure Information kept private – until advisory is released Advisory released on –Target Date or –When a patch is issued  Advisory refers to the release  Release notes refer to the advisory –Whichever is the sooner Advisories are released on the GSVG web page at (earlier advisories were in the release notes)

Enabling Grids for E-sciencE EGEE-III INFSO-RI Reducing Security Risk 8 Why this strategy? Information is kept private except for those who are involved in the resolution of an issue to reduce the risk of exploitation Providing a Target Date allows the prioritization of resolution Information is disclosed in a timely manner to provide confidence in the system

Enabling Grids for E-sciencE EGEE-III INFSO-RI Reducing Security Risk 9 Types of issue Most issues result from Bugs in gLite Middleware –Handled as described Some result from bugs in 3 rd party software –Handled in a similar way –We don’t release advisory on Target Date unless issue is fixed without permission from software provider, or the software provider has already made the information public Operational issues –Produce advisory to OSCT –Risk assessment not essential General Concerns/missing functionality –These are raised more broadly within project (SCG/TMB)

Enabling Grids for E-sciencE EGEE-III INFSO-RI Reducing Security Risk 10 Anyone! OSCT GSVG TMB EMT + developers SCG Advisory disclosure on web Operational issue Patch available When Patch is available or on Target Date advisory placed on web Missing functionality and other general concerns are discussed with TMB, SCG, MWSG Security bug in middleware PATCH Released Basic interactions with other groups in EGEE-II Release refers to advisory, advisory refers to release Submit issue

Enabling Grids for E-sciencE EGEE-III INFSO-RI Reducing Security Risk 11 Some numbers (16 th Sept 2008) 144 issues submitted since work began in closed –49 fixed, 15 invalid, 5 duplicates, 5 software no longer in use, 10 general concerns, 9 OSCT informed 51 open –3 before TD, 15 general concerns/missing functionality, 14 disclosed (still open), 2 3 rd party (OSCT knows about them), 8 other, 9 in work (but not disclosed) Some of the more general concerns/missing functionality are the ones that seem to be open long term without resolution –Need new approach

Enabling Grids for E-sciencE EGEE-III INFSO-RI Reducing Security Risk 12 Current status – 16 th Sept 2008

Enabling Grids for E-sciencE EGEE-III INFSO-RI Reducing Security Risk 13 More on Advisories Important not to disclose publicly ‘how to exploit’ Should say ‘how to remove vulnerability from your deployment’ –Usually on public web page recommend installing patches If a problem requires an operational solution, and details of how to fix reveals how to exploit – this should not be on a public web page! –We send to the OSCT list Plan to include ‘who may be affected’ or ‘who is at risk’ –E.g. VO, site, user…

Enabling Grids for E-sciencE EGEE-III INFSO-RI Reducing Security Risk 14 Issues that are not straightforward bugs Some issues result from missing functionality or more general concerns –Cannot be simply handled by asking a developer to fix them These are the main ones that seem to remain open long term Some require a change in the design, or new software to be developed Generally very well known within the project These have been documented in

Enabling Grids for E-sciencE EGEE-III INFSO-RI Reducing Security Risk 15 Issues which are not bugs (2) Some examples: Middleware code integrity must be assured –Strong desire for software signing Outbound IP access should be restricted –Outbound access needed for pilot jobs –Dynamic connectivity service was considered No unique tracing of external actions from a WN –Improvements to logging is being carried out

Enabling Grids for E-sciencE EGEE-III INFSO-RI Reducing Security Risk 16 Code walkthroughs and testing In EGEE-II work was carried out at Poznan by the PNSC security team Various packages were reviewed (e.g. R-GMA, LFC) Result of reviews and testing revealed problems –Reports were written These treated as vulnerability issues If any future reviews take place, this strategy will continue

Enabling Grids for E-sciencE EGEE-III INFSO-RI Reducing Security Risk 17 Vulnerability prevention We also want to prevent new vulnerabilities from being introduced A checklist was produced prior to EGEE-II, but this was not used – probably document too long Alongside EGEE-II, ISSEG project looked at education on security, including a checklist for developers Poznan has also produced a document on Security Best Practices for administrators, developers and users of the EGEE infrastructure –This includes detailed instructions on how to avoid some types of vulnerability Plan to put information together on how to prevent vulnerabilities in 1 place– ensure developers guide refers to this

Enabling Grids for E-sciencE EGEE-III INFSO-RI Reducing Security Risk 18 3 Common Types of vulnerability File permissions –E.g. world writable executable directory –One of the easiest to prevent yet a common cause of vulnerabilities Input not sanitized –mySQL injection vulnerabilities –XSS vulnerabilities Buffer overflows –Still get these –Careful with constructs These are easy to prevent

Enabling Grids for E-sciencE EGEE-III INFSO-RI Reducing Security Risk 19 The Security Assessment Plan The Security Assessment Plan is an EGEE-III milestone Describes the Plan for the on-going assessment of operational and Middleware security This includes 2 metrics for vulnerability handling –1 to measure the timeliness of GSVG handling –1 to measure the timeliness of resolution of issues –Soon should formulate within GSVG and start using them Also includes an Overall Security Risk Assessment –Which will be led by SCG

Enabling Grids for E-sciencE EGEE-III INFSO-RI Reducing Security Risk 20 Overall Security Risk Assessment In LCG in 2003 a security Risk assessment was carried out –44 high level risks were described  E.g. misuse of resources to attack other systems, unauthorized distribution of data… –Committee decided on the risk value – security/RiskAnalysis/risk.htmlhttp://proj-lcg-security.web.cern.ch/proj-lcg- security/RiskAnalysis/risk.html Plan to re-visit these Risks, and any others that we consider appropriate –But with a greater emphasis on what to do to reduce the Risks SCG will lead this – with input from various members of the various security groups

Enabling Grids for E-sciencE EGEE-III INFSO-RI Reducing Security Risk 21 Overall Security Risk Assessment (2) For each identified Risk the plan is to do the following Describe the risk Produce a numerical value for the risk Describe what is currently being done to reduce this risk Describe what should be done (if necessary) to reduce this risk This will allow the prioritization of the mitigation of the most serious security risks Also, re-visit at the end of the project to see to what extent risks have been reduced

Enabling Grids for E-sciencE EGEE-III INFSO-RI Reducing Security Risk 22 Overall Security Risk Assessment (3) Some of the Missing functionality/general concern type GSVG issues could be considered additional risks, or addressing them could reduce some of the overall risk –These may form input to this process –Some may be additional risks –Some may need resolving to mitigate higher level risks This General Security Risk Assessment will complement GSVG work on specific issues in the database Some GSVG issues/concerns may get moved to this more general risk assessment

Enabling Grids for E-sciencE EGEE-III INFSO-RI Reducing Security Risk 23 GSVG issue => Risk Risk = Malicious middleware is distributed GSVG issue = Middleware code integrity must be assured Compute Risk => If scores highly then good case for software signing Risk = Resources used to launch attack on other sites GSVG issue = Outbound IP access should be restricted –Compute Risk => If scores highly then good case for implementing software to e.g. restrict outbound access to other sites, log access, produce proposed dynamic connectivity service

Enabling Grids for E-sciencE EGEE-III INFSO-RI Reducing Security Risk 24 Conclusions The GSVG issue handling is operating well for issues that result from bugs in gLite middleware –RAT members tend to agree on the risk –Process is well established and accepted Passing information to OSCT is working well for operational issues Possibly we need to consider improvement to handling of VO software issues and 3 rd party issues Issues arising from design problems, missing functionality or general concerns need some improvement – this may partly come from the more general Security Risk Assessments

Enabling Grids for E-sciencE EGEE-III INFSO-RI Reducing Security Risk 25 Further information GSVG webpage –Includes summary of issue handling process, advisories, links to documents Security assessment plan

Enabling Grids for E-sciencE EGEE-III INFSO-RI Reducing Security Risk 26 Questions/Discussion? ???