Presentation is loading. Please wait.

Presentation is loading. Please wait.

Scenario 2: Safety Critical Instruments. Threats/Risk Analysis o All the usual grid problems o Greater risk of overlapping resource usage o Risk of confidentiality.

Similar presentations


Presentation on theme: "Scenario 2: Safety Critical Instruments. Threats/Risk Analysis o All the usual grid problems o Greater risk of overlapping resource usage o Risk of confidentiality."— Presentation transcript:

1 Scenario 2: Safety Critical Instruments

2 Threats/Risk Analysis o All the usual grid problems o Greater risk of overlapping resource usage o Risk of confidentiality leaks (accidental?) o Grid ethos conflicts with safety-critical ops o Impact severity of information leaks (eg pharma paranoia)

3 Major Issues o Requirements to make results publicly available (at some time) o How does remote user verify actual derivation of results for review/publication

4 Policy Requirements o Document user-interaction with service/resource (like extended lab manual) o Decouple low-level execution language o From high-level service use language o Encode these requirements into interface/translation constraints to eqip controlling software

5 Trust Relationships o Not based solely on technical (electronic) assertions (eg PKI) o Trust based on signing chain expressed a credibility (authority of institution (RA)) o Trust to use resource mediated by research council o Trust to use resource ultimately based on local authorisation

6 Roles o Physical operation o Service access o Service provision (local RA/grid) o Training provider (in house for project kit; outside fore remote safety training) o Roles not static o Security officer

7 Technical Gaps o Graceful failure – grid mediated authorisation o Last resort – console access to perform shutdown recover o Local+remote authentication and authorisation for local equipment for example grid firewalls, changing over time o Firewall to protect campus nets from outdoing grid traffic o Vendor eqpt not designed with security of interoperability in mind o Requires common language to express services constraints on use (esp safety criticality)

8 Training Requirements o Generic – for end users (safe key storage etc) o Safety – ring fenced security layers to stop users doing undesirable things o Resources – classify and identify resources according to safety criticality and authorise accordingly.

9 Recommendations oDistinguish infrastructure issues from project resource specific –specific ones oIdentify other safety concerned grid projects (as well as safety crucial resources or operations)

10 Recommendations o Distinguish infrastructure issues from project resource specific –specific ones o Identify other safety concerned grid projects (as well as safety crucial resources or operations)


Download ppt "Scenario 2: Safety Critical Instruments. Threats/Risk Analysis o All the usual grid problems o Greater risk of overlapping resource usage o Risk of confidentiality."

Similar presentations


Ads by Google