EGEE-III INFSO-RI-222667 Enabling Grids for E-sciencE www.eu-egee.org EGEE and gLite are registered trademarks Vulnerability handling, Risk management,

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Security Vulnerabilities Dr Linda Cornwall,
Advertisements

INFSO-RI Enabling Grids for E-sciencE Update on LCG/EGEE Security Policy and Procedures David Kelsey, CCLRC/RAL, UK
INFSO-RI Enabling Grids for E-sciencE Operational Security OSCT JSPG March 2006 Ian Neilson, CERN.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI The EGI Software Vulnerability Group and EMI Dr Linda Cornwall, STFC, Rutherford.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGI-InSPIRE The EGI Software Vulnerability Group (SVG) What is a Software Vulnerability?SVG membership and interaction with other groups Most people are.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
INFSO-RI Enabling Grids for E-sciencE Incident Response Policies and Procedures Carlos Fuentes
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks From ROCs to NGIs The pole1 and pole 2 people.
The Grid Services Security Vulnerability and Risk Assessment Activity in EGEE-II Enabling Grids for E-sciencE EGEE-II INFSO-RI
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Handling Grid Security Vulnerabilities in.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks The Grid Security Vulnerability Group Dr.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Security Vulnerability Handling and.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Steven Newhouse EGEE’s plans for transition.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud F2F Security Issues in the cloud Introduction Linda Cornwall,
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSVG issues handling Dr Linda Cornwall CCLRC.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Middleware Deployment and Support in EGEE.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Ake Edlund EGEE Sec Head 9th MWSG meeting, SLAC,
Security Policy Update LCG GDB Prague, 4 Apr 2007 David Kelsey CCLRC/RAL
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
Update on the Grid Security Vulnerability Group Linda Cornwall, MWSG7, Amsterdam 14 th December 2005
Security Vulnerabilities Linda Cornwall, GridPP15, RAL, 11 th January 2006
STEP 4 Manage Delivery. Role of Project Manager At this stage, you as a project manager should clearly understand why you are doing this project. Also.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Linda Cornwall CCLRC (RAL) FP6 Security workshop.
15-Dec-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the Joint Security Policy Group) CERN 15 December 2004 David Kelsey CCLRC/RAL,
Grid Security Vulnerability Group Linda Cornwall, GDB, CERN 7 th September 2005
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Dr Linda Cornwall CCLRC (RAL) FP6 Security workshop.
The Grid Security Vulnerability Group (GSVG) Enabling Grids for E-sciencE EGEE-III INFSO-RI Eliminating and Preventing.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Gergely Sipos Activity Deputy Manager MTA.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks EGI Operations Tiziana Ferrari EGEE User.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks ROC Security Contacts R. Rumler Lyon/Villeurbanne.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Security Threat Risk Assessment Dr Linda Cornwall Rutherford Appleton.
Security Operations David Kelsey GridPP Deployment Board 3 Mar 2005
Security Vulnerability Identification and Reduction Linda Cornwal, JRA1, Brno 20 th June 2005
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Task tracking SA3 All Hands Meeting Prague.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Services Security Vulnerability and.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Standard network trouble tickets exchange.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Robin McConnell NA3 Activity Manager 28.
Security Policy: From EGEE to EGI David Kelsey (STFC-RAL) 21 Sep 2009 EGEE’09, Barcelona david.kelsey at stfc.ac.uk.
Additional Services: Security and IPv6 David Kelsey STFC-RAL.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Operations Automation Team Kickoff Meeting.
Security Vulnerability Detection and reduction Linda Cornwall MWSG, CERN 24 Feb 2005
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Patch Preparation SA3 All Hands Meeting.
INFSO-RI Enabling Grids for E-sciencE gLite Test and Certification Effort Nick Thackray CERN.
Recent lessons learned: Operational Security David Kelsey CCLRC/RAL, UK GDB Meeting, BNL, 5 Sep 2006.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks NA5: Policy and International Cooperation.
INFSO-RI Enabling Grids for E-sciencE Joint Security Policy Group David Kelsey, CCLRC/RAL, UK 3 rd EGEE Project.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks What all NGIs need to do: Helpdesk / User.
INFSO-RI Enabling Grids for E-sciencE File Transfer Software and Service SC3 Gavin McCance – JRA1 Data Management Cluster Service.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud and Software Vulnerabilities Linda Cornwall, STFC 20.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security aspects (based on Romain Wartel’s.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks NA5: Policy and International Cooperation.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Questionnaires to Cloud technology providers and sites Linda Cornwall, STFC,
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
EGEE-II Enabling Grids for E-sciencE EGEE and gLite are registered trademarks The Grid Security Vulnerability Group Activity in Central.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI D4.4 and the EGI review Dr Linda Cornwall 19 th Sept 2011 D4.41.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSVG issue handling summary Dr Linda Cornwall.
Directory/Inventory – info sharing for security people
Open Science Grid Consortium Meeting
EGI Software Vulnerability Group (SVG) report to CSIRT F2F
Grid Services Security Vulnerability and Risk Analysis
Romain Wartel EGEE08 Conference, Istanbul, 23rd September 2008
EGI Security Risk Assessment
Software Vulnerability Group Status update
Prevention is better than Cure
Presentation transcript:

EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Vulnerability handling, Risk management, and plans for transition to EGI Linda Cornwall STFC, The Rutherford Appleton Laboratory. EGEE’ th September, Barcelona, Spain

Enabling Grids for E-sciencE EGEE-III INFSO-RI Contents of talk Brief reminder of strategy for handling Grid Security Vulnerabilities in EGEE-III Status update Plans for transition to EGI Questions on Vulnerability handling and transition to EGI Plans for an Overall Security Risk Assessment to be led by the Security Co-ordination Group (SCG) Vulnerability and Risk management 2

Enabling Grids for E-sciencE EGEE-III INFSO-RI The Grid Security Vulnerability Group (GSVG) Vulnerability and Risk management 3 Started in EGEE-II, continuing in EGEE-III “The Purpose of the Grid Security Vulnerability Group is to eliminate Grid Security Vulnerabilities from the software, and prevent new ones being introduced. The aim is to provide a high level of confidence in the security of the deployed infrastructure, thus reducing the risk of incidents.” Largest part of the work is the handling of specific Grid Security Vulnerability issues as they are found

Enabling Grids for E-sciencE EGEE-III INFSO-RI Vulnerability and Risk management 4 People involved in GSVG issue handling Linda Cornwall, Stephen Burke (RAL, UK) Vincenzo Ciaschini (INFN, Italy) Ákos Frohner, Maarten Litmaath, Romain Wartel, Gergely Debreczeni (CERN) Oscar Koeroo (NIKHEF, Holland) Daniel Kouril (CESNET, Czech Republic) Kálmán Kővári (KFKI-RMKI, Hungary) Eygene Ryabinkin (RRC-KI, Russia) Åke Sandgren (HPC2N, Sweden)

Enabling Grids for E-sciencE EGEE-III INFSO-RI Vulnerability and Risk management 5 GSVG Issue handling summary This was established and approved in EGEE-II GSVG handles issues concerning the EGEE middleware, it’s deployment, and more general concerns Anyone may report an issue –By ing to –By entering in the GSVG savannah  Note that bugs are private so cannot be read except by members of this savannah project The Risk Assessment Team (RAT) investigates the issue, and for valid issues carries out a Risk Assessment

Enabling Grids for E-sciencE EGEE-III INFSO-RI Vulnerability and Risk management 6 Risk Assessments Each valid issue is placed in 1 of 4 risk categories –Extremely Critical –High –Moderate –Low Target Date for resolution set according to risk –Extremely Critical – 2 days –High – 3 weeks –Moderate – 3 months –Low – 6 months This allows for the prioritization and timely resolution of vulnerabilities

Enabling Grids for E-sciencE EGEE-III INFSO-RI Vulnerability and Risk management 7 Disclosure Information kept private – until advisory is released Advisory released on –Target Date or –When a patch is issued  Advisory refers to the release  Release notes refer to the advisory –Whichever is the sooner Advisories are released on the GSVG web page at (earlier advisories were in the release notes)

Enabling Grids for E-sciencE EGEE-III INFSO-RI What GSVG does not do GSVG does not handle vulnerabilities in operating systems –If information is reported to us we will pass it on GSVG does not handle vulnerabilities in non-Grid specific 3 rd party software –Again we will pass it on Fix vulnerabilities in software –But some GSVG members are members of development teams so do fix vulnerabilities –not a GSVG task GSVG does not handle incidents – i.e. where issue has been exploited –Incident prevention –If incident is due to a vulnerability – GSVG will get involved Vulnerability and Risk management 8

Enabling Grids for E-sciencE EGEE-III INFSO-RI Some numbers (17 th Sept 2009) 174 Issues submitted since started in 2005 –(28 submitted in last 12 months) –For those fully risk assessed (since current strategy started mid 2006) 1EC, 19 High, 21 Moderate, 39 Low 111 closed –64 closed as fixed, 16 invalid, 5 duplicates, 10 OSCT informed, 5 software no longer in use, 11 more general concerns adequately addressed 63 open –17 awaiting TD, 15 disclosed, most of the rest either very low risk or more general concerns rather than specific vulnerabilities –Situation with open issues not awaiting TD described in document at  Unlikely to contain any surprises Vulnerability and Risk management 9

Enabling Grids for E-sciencE EGEE-III INFSO-RI Experience of Issue handling The majority of issues get investigated in a timely manner (i.e. within 2-4 working days) Earlier on there was possibly a tendency to put things in too high a risk category RAT members now usually agree on Risk categories – probably we get it about right now The majority of issues which remain open long term are more general concerns over security rather than vulnerability bugs –These will be considered as part of the Overall Security Risk Assessment Vulnerability and Risk management 10

Enabling Grids for E-sciencE EGEE-III INFSO-RI Vulnerabilities and EGI It is recognised that Grid Security Vulnerability issue handling will be needed as the Grid moves to EGI The main purpose should continue to be the elimination of vulnerabilities from the deployed infrastructure and prevent the introduction of new ones –This should be part of EGI (not the software process) to ensure that the focus is on ensuring the deployed infrastructure is as secure as possible. –The issue handling process also needs some independence from the Software development process, so that information on issues can be disclosed in a timely manner Close co-operation will be needed with the EGI software distribution –such as the Unified Middleware Distribution (UMD) and software development teams Vulnerability and Risk management 11

Enabling Grids for E-sciencE EGEE-III INFSO-RI Software Vulnerabilities Group (SVG) in EGI The Software Vulnerabilities Group will be part of Security Operations SVG chair along with 2-3 deputies will co-ordinate the activity Risk Assessment Team (RAT) members will continue to be needed –Better to have a reasonable size group of people spending a small % of their time on this activity, for max range of expertise Members will be drawn from NGI site administrators and other deployment teams, software development teams and other security experts –Influence on exactly how things are done is established by providing effort –This gives incentive to provide effort Vulnerability and Risk management 12

Enabling Grids for E-sciencE EGEE-III INFSO-RI Effort for EGI SVG Current members will, of course, be invited to continue Further effort will be invited As people either join, or continue from GSVG details of the EGI strategy will be defined Vulnerability and Risk management 13

Enabling Grids for E-sciencE EGEE-III INFSO-RI Issue Handling in EGI Issue handling should follow similar principles to within EGEE-II and EGEE-III but with the major difference that software will effectively be 3 rd party If vulnerabilities are reported to SVG, then they will be handled in a similar way to the EGEE-II/EGEE-III GSVG issue handling strategy –Risk Assessments carried out –Advisories disclosed on or before Target Date If vulnerabilities are found and fixed by the software provider, it is necessary to ensure that the patches are incorporated in the EGI/UMD software in a timely manner Vulnerability and Risk management 14

Enabling Grids for E-sciencE EGEE-III INFSO-RI Vulnerability and Risk management 15 UMD Middleware gLiteARC UNICORE gLite Dev 2 gLite Dev 1 ARC Dev 1 ARC Dev 2 Uni Dev 1 Uni Dev 2 EGI Operational Security NGI 1NGI 2NGI 3 Sites OSCTSVG MWSG EUGri dPMA SPG EGI Management Coordination and RAT members of SVG (examples) A Grid Security Vulnerability Issue may be reported by anyone. SVG will communicate will all necessary to investigate and resolve problems reported according to the documented process (examples) Other Grids

Enabling Grids for E-sciencE EGEE-III INFSO-RI Transition to EGI A description of the principle of Grid Security Vulnerability issue handling and responsible disclosure will be produced early –Ask for formal approval from EGI project When a software provider ‘signs up’ to be part of the UMD/EGI software distribution they agree to –The principle of the SVG including the responsible disclosure strategy –Provide contact details for developers when the SVG is investigating an issue –A response time, and to co-operate in the investigation of issues –Co-ordinate distribution of software with EGI if they find a vulnerability themselves –And decide whether they wish to supply effort to the process Vulnerability and Risk management 16

Enabling Grids for E-sciencE EGEE-III INFSO-RI When does transition occur? Once middleware is distributed by EGI/UMD any vulnerabilities in that middleware will be handled using the EGI strategy –The transition to EGI for vulnerability handling will happen as the transition to distribution from EGI happens. –The speed of transition from the EGEE GSVG issue handling to the EGI SVG handling will largely depend on when software becomes distributed by EGI rather than by the current methods A lot of the process details will be established at this time –Established by the EGI SVG team which provides both acceptance of the process and incentive to supply effort Vulnerability and Risk management 17

Enabling Grids for E-sciencE EGEE-III INFSO-RI Before move on Any questions on vulnerability handling and transition to EGI? Vulnerability and Risk management 18

Enabling Grids for E-sciencE EGEE-III INFSO-RI Overall Security Risk Assessment Here we consider security threats and risks to and resulting from the Grid deployment –This is a risk assessment for high level threats, not specific vulnerabilities This work will be carried out by the EGEE Security Co- ordination Group (SCG), and members of GSVG, OSCT, JSPG and others. This is partly an update of the LCG Risk analysis carried out in 2003 –44 high level risks were identified –Committee decided on risks security/RiskAnalysis/risk.htmlhttp://proj-lcg-security.web.cern.ch/proj-lcg- security/RiskAnalysis/risk.html Vulnerability and Risk management 19

Enabling Grids for E-sciencE EGEE-III INFSO-RI LCG Risk Analysis Vulnerability and Risk management 20 IDDescriptionRisk Analysis LikelyhoodImpact Computed Risk AvgStdevAvgStdev Security Issues - Intentional or malicious attacks Misuse of LCG resources - CPU, storage, network etc M1 Resources used to launch online attacks on other sites via DOS, Virus, Worms, SPAM etc M2 Resources used for offline attacks on other sites, e.g. to crack passwords or pass phrases M3 Resources used to distribute or share non-LCG data, e.g. copyrighted, illegal, or inappropriate material M4Resources misused by inappropriate setting of access control or priority M5Use of LCG resources by unauthorized parties M6Use of LCG resources for unauthorized purposes, e.g. financial gain Confidentiality and Data integrity issues C1Theft of credentials, e.g. private keys C2 Data or passwords/pass phrases exposed, e.g. in unprotected files or on the network C3Falsification of scientific data, analysis and/or results C4Unauthorized monitoring of network communications C5Unauthorized access to data C6Unauthorized distribution or exposure of data C8Identity or usage information is harvested by unauthorized persons Disruption of LCG infrastructure for political or other reasons D1Disruption via exploitation of security holes D2Corruption of or damage to data D3DOS attacks towards LCG to prevent normal working of network or services

Enabling Grids for E-sciencE EGEE-III INFSO-RI Main similarities A team decides which threats to consider Identified threats are risk assessed based on people’s judgement of impact and likelihood The two are multiplied together to give a risk value Linda Cornwall - Overall Security Risk Assessment 21

Enabling Grids for E-sciencE EGEE-III INFSO-RI Main differences The current situation should be clarified for each threat/risk The risk assessment is based on the current situation The results are presented to management including the Technical Management Board (TMB) to encourage mitigation of the highest risks Suggestions may be made for what needs to continue to keep risks down, and what further may be done to reduce risk Linda Cornwall - Overall Security Risk Assessment 22

Enabling Grids for E-sciencE EGEE-III INFSO-RI st step: establish a team Anyone interested in carrying out this assessment can join JSPG, SCG, GSVG, OSCT have been ed about this Vulnerability and Risk management 23

Enabling Grids for E-sciencE EGEE-III INFSO-RI nd step: Review the strategy I have drafted a strategy in a brief document – the team should review it and modify if necessary Basically it is to –Select threats/risks –Assign a team member responsible for each threat/risk  Probably all team members will have to be responsible for some threats –For each threat/risk the team member responsible establishes the current situation –Compute the risk  Review method of computation of risk –Present our findings – including comments and suggestions Vulnerability and Risk management 24

Enabling Grids for E-sciencE EGEE-III INFSO-RI rd step: selection of threats I have produced a draft selection of threats in a spreadsheet –This includes all from the LCG Risk Analysis –Plus a few from OSG’s list –Plus a few that have been reported to GSVG which are general concerns rather than software bugs –Plus others I have thought of The team should decide which threats are assessed –If a team member wishes to include a threat – it should be included rather than excluded –The team may consult others Threats should be general rather than software specific –However the software currently used may define the current situation and hence the likelihood aspect of the risk Vulnerability and Risk management 25

Enabling Grids for E-sciencE EGEE-III INFSO-RI Step 4: establishment of current situation For each threat a ‘responsible’ is assigned –Team members volunteer for threats they know most about –This does not mean they are responsible if the threat is carried out, or for the existence of the threat, they are just responsible for finding information The responsible then checks the current situation for the threats he/she is assigned –In some cases this may be trivial, in others may require some work –Other experts may be consulted This is important, so that the risk can be computed according to the current situation, not some hypothetical situation The more safeguards in place – the lower the risk Vulnerability and Risk management 26

Enabling Grids for E-sciencE EGEE-III INFSO-RI Step 5 Computation of Risk Most actuarial computation (e.g. insurance) of risk is based on statistics, based on likelihood and cost. We attempt to produce a numerical value for risk without appropriate statistics – based on judgement Each team member gives their opinion on the Impact between 1 and 5 –1 low, 5 high Likelihood between 1 and 5 Then discuss to see if we can find an agreement Multiply together to produce a numerical value of risk This computation method is my first suggestion – the team should agree the method of computation of risk Vulnerability and Risk management 27

Enabling Grids for E-sciencE EGEE-III INFSO-RI Step 6: Present to management Results of the Risk Assessment should be presented to management Suggestions and comments may be made on how to either mitigate threats, or ensure current mitigating action stays in place For the higher risks, it is hoped that action will be taken This is primarily the responsibility of management and the TMB –The Overall Security Risk Assessment task ends with presenting findings to management –This does not mean team members will not help to mitigate risks Vulnerability and Risk management 28

Enabling Grids for E-sciencE EGEE-III INFSO-RI Docs and contact A brief document describing the Overall Security Risk Assessment plan, and a spreadsheet containing the first draft of the threats is available at: If you are interested in participating, please me: Linda.Cornwall.at. STFC.ac.uk Vulnerability and Risk management 29

Enabling Grids for E-sciencE EGEE-III INFSO-RI TBDs concerning overall RA Does the strategy make sense? Should the process be carried out by , or does the team need to get together and work round a table? ??? Vulnerability and Risk management 30