Open Science Grid Security Activities D. Olson, LBNL OSG Deputy Security Officer For the OSG Security Team: M. Altunay, FNAL, OSG Security Officer, D.O.,

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks MyProxy and EGEE Ludek Matyska and Daniel.
Advertisements

9/25/08DLP1 OSG Operational Security D. Petravick For the OSG Security Team: Don Petravick, Bob Cowles, Leigh Grundhoefer, Irwin Gaines, Doug Olson, Alain.
Authorization WG Update David Kelsey EU Grid PMA, Copenhagen 27 May 2008.
Open Science Grid Use of PKI: Wishing it was easy A brief and incomplete introduction. Doug Olson, LBNL PKI Workshop, NIST 5 April
OSG Area Coordinators Meeting Security Team Report Mine Altunay 05/15/2013.
Open Science Grid Use of PKI: Wishing it was easy A brief and incomplete introduction. Doug Olson, LBNL PKI Workshop, NIST 5 April 2006.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
Open Science Grid Software Stack, Virtual Data Toolkit and Interoperability Activities D. Olson, LBNL for the OSG International.
CILogon OSG CA Mine Altunay Jim Basney TAGPMA Meeting Pittsburgh May 27, 2015.
OSG Security Review Mine Altunay June 19, June 19, Security Overview Current Initiatives  Incident response procedure – top priority (WBS.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 12/21/2011.
OSG Operations and Interoperations Rob Quick Open Science Grid Operations Center - Indiana University EGEE Operations Meeting Stockholm, Sweden - 14 June.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGEE ARM-2 – 5 Oct LCG Security Coordination Ian Neilson LCG Security Officer Grid Deployment Group CERN.
GGF12 – 20 Sept LCG Incident Response Ian Neilson LCG Security Officer Grid Deployment Group CERN.
May 8, 20071/15 VO Services Project – Status Report Gabriele Garzoglio VO Services Project – Status Report Overview and Plans May 8, 2007 Computing Division,
Blueprint Meeting Notes Feb 20, Feb 17, 2009 Authentication Infrastrusture Federation = {Institutes} U {CA} where both entities can be empty TODO1:
G RID M IDDLEWARE AND S ECURITY Suchandra Thapa Computation Institute University of Chicago.
Apr 30, 20081/11 VO Services Project – Stakeholders’ Meeting Gabriele Garzoglio VO Services Project Stakeholders’ Meeting Apr 30, 2008 Gabriele Garzoglio.
Mine Altunay OSG Security Officer Open Science Grid: Security Gateway Security Summit January 28-30, 2008 San Diego Supercomputer Center.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 04/3/2013.
Mar 28, 20071/9 VO Services Project Gabriele Garzoglio The VO Services Project Don Petravick for Gabriele Garzoglio Computing Division, Fermilab ISGC 2007.
Evolution of the Open Science Grid Authentication Model Kevin Hill Fermilab OSG Security Team.
Federated Environments and Incident Response: The Worst of Both Worlds? A TeraGrid Perspective Jim Basney Senior Research Scientist National Center for.
OSG Security Review Mine Altunay December 4, 2008.
Identity Management in Open Science Grid Identity Management in Open Science Grid Challenges, Needs, and Future Directions Mine Altunay OSG Security Officer.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 8/15/2012.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
Mine Altunay July 30, 2007 Security and Privacy in OSG.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 6/6/2012.
Grid Operations Lessons Learned Rob Quick Open Science Grid Operations Center - Indiana University.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Linda Cornwall CCLRC (RAL) FP6 Security workshop.
Meeting Minutes and TODOs TG has no distributed monitoring. During incident response, use a manual twiki page to distribute information TG monitors the.
US LHC OSG Technology Roadmap May 4-5th, 2005 Welcome. Thank you to Deirdre for the arrangements.
Grid Security Vulnerability Group Linda Cornwall, GDB, CERN 7 th September 2005
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
Open Science Grid & its Security Technical Group ESCC22 Jul 2004 Bob Cowles
Open Science Grid Security Activities Mine Altunay, FNAL OSG Security Officer For the OSG Security Team: Doug Olson, Deputy Security Officer, LBNL, Jim.
A Trust Framework for Security Collaboration among Infrastructures David Kelsey (STFC-RAL, UK) WLCG GDB, CERN 10 Jul 2013.
The OSG and Grid Operations Center Rob Quick Open Science Grid Operations Center - Indiana University ATLAS Tier 2-Tier 3 Meeting Bloomington, Indiana.
NIST Computer Security Framework and Grids Original Slides by Irwin Gaines (FNAL) 20-Apr-2006 Freely Adapted by Bob Cowles (SLAC/OSG) for JSPG 13-Mar-2007.
Security Vulnerability Identification and Reduction Linda Cornwal, JRA1, Brno 20 th June 2005
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
Operations Activity Doug Olson, LBNL Co-chair OSG Operations OSG Council Meeting 3 May 2005, Madison, WI.
OSG Site Admin Workshop - Mar 2008Using gLExec to improve security1 OSG Site Administrators Workshop Using gLExec to improve security of Grid jobs by Alain.
Security Policy: From EGEE to EGI David Kelsey (STFC-RAL) 21 Sep 2009 EGEE’09, Barcelona david.kelsey at stfc.ac.uk.
Security Policy Update WLCG GDB CERN, 14 May 2008 David Kelsey STFC/RAL
Grid Security and Identity Management Mine Altunay Security Officer, Open Science Grid, Fermilab.
EGI-InSPIRE RI EGI EGI-InSPIRE RI Establishing Identity in EGI the authentication trust fabric of the IGTF and EUGridPMA.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 02/13/2012.
EGEE ARM-2 – 5 Oct LCG/EGEE Security Coordination Ian Neilson Grid Deployment Group CERN.
JSPG Update David Kelsey MWSG, Zurich 31 Mar 2009.
Identity Management in Open Science Grid Identity Management in Open Science Grid Challenges, Needs, and Future Directions Mine Altunay, James Basney,
Planning for LCG Emergencies HEPiX, Fall 2005 SLAC, 13 October 2005 David Kelsey CCLRC/RAL, UK
Open Science Grid OSG Resource and Service Validation and WLCG SAM Interoperability Rob Quick With Content from Arvind Gopu, James Casey, Ian Neilson,
OSG Security: Updates on OSG CA & Federated Identities Mine Altunay, PhD OSG Security Team OSG AHM March 24, 2015.
Security Bob Cowles
OSG Area Coordinators Meeting Security Team Report Mine Altunay 8/15/2012.
Grid Security Policy: EGEE to EGI David Kelsey (RAL) 16 Sep 2009 JSPG meeting, DFN Berlin david.kelsey at stfc.ac.uk.
New OSG Virtual Organization Security Training OSG Security Team.
Grid Colombia Workshop with OSG Week 2 Startup Rob Gardner University of Chicago October 26, 2009.
OSG Security Review Mine Altunay March 12, Jan Security Overview Current Initiatives  OSG Security roadmap  Technical and operational.
Bob Jones EGEE Technical Director
David Kelsey CCLRC/RAL, UK
JRA3 Introduction Åke Edlund EGEE Security Head
LCG Security Status and Issues
Ian Bird GDB Meeting CERN 9 September 2003
Leigh Grundhoefer Indiana University
Federated Environments and Incident Response: The Worst of Both Worlds
Presentation transcript:

Open Science Grid Security Activities D. Olson, LBNL OSG Deputy Security Officer For the OSG Security Team: M. Altunay, FNAL, OSG Security Officer, D.O., R. Cowles SLAC (past member), J. Basney NCSA (new member), Ron Cudzwicz FNAL, Rob Quick IU/GOC, Alain Roy U.Wisc./VDT ISGC2008 Taipei 9-11 April 2008

9 April 2008Olson, OSG Security, ISGC20082 Abstract The status and directions of the security activities of the Open Science Grid. The high-level goal is to provide a security framework that enables science and promotes autonomous and open science collaboration among VOs, sites, and software providers. Keeping the balance between openness, which is necessary for the science, and the security is at the core of our work. We address these goals by providing: operational security, interoperability with other grids, and education. The operational security processes are modeled on the NIST guidelines for security controls for information systems and includes appropriate communications channels for vulnerability awareness and incident response. Interoperability work spans the range from international policy development (JSPG, IGTF) to inter-grid information services to middleware development coordination (MWSG). Using the concept of Integrated Security Management where every person has responsibilities for security, we have started developing awareness materials and providing role- based training on security practices and features to grid participants.

9 April 2008Olson, OSG Security, ISGC20083 Contents Goals Methodology Operations Interoperability Education Development and Directions Conclusion

9 April 2008Olson, OSG Security, ISGC20084 Goals The high-level goal is to provide a security framework that enables science and promotes autonomous and open science collaboration among VOs, sites, and software providers. Availability - Keeping the balance between openness, which is necessary for the science, and the security is at the core of our work. Integrity – of resources, VOs, middleware quality Confidentiality – sufficient to meet the community requirements Fine print – –data integrity is a data owner issue and VOs own application data –Confidentiality between VOs depends on sites’ policies and practices and no extraordinary requirements have been expressed

9 April 2008Olson, OSG Security, ISGC20085 Methodology NIST process –used by government laboratories –No apparent standards for U.S. universities Integrated Security Management –Security is part of everyone’s responsibilities Security processes integrated with Operations

9 April 2008Olson, OSG Security, ISGC20086 NIST Modeled on NIST IT security process, adapted to meet OSG requirements. Slide from Irwin Gaines

9 April 2008Olson, OSG Security, ISGC20087 Security Plan Outline of security plan 1 OVERVIEW 2 CONTROLS 2.1 Risk Assessment and Management 2.2 Overview of OSG Security Control Clusters 2.3 Management Controls Integrated Computer Security Management Security Processes Trust relationships 2.4 Operational Controls Security Training and Awareness Incident Response Data Integrity Configuration Management Vulnerability Management Physical Access Control and Site Management for Production Services. 2.5 Technical Controls Monitoring Access Control for Core OSG Administrators/Users Scanning 3 References Includes 50 specific controls We have started a second pass of NIST loop –First pass included only OSG core –Second pass will include OSG participants (resource providers and VOs)

9 April 2008Olson, OSG Security, ISGC20088 ISM = Owners’ Responsible OSG core service - Owner –Software (VDT) – Alain R. –Web presence, lists – Marcia T. –GOC services – Rob Q. reg. db, tickets, VOMS, monitoring, … –Integration Test Bed – Rob G. –Accounting collector (Gratia) – Phillipe C. –Engagement – John M. –Security processes – Mine A. –RA – Doug O.

9 April 2008Olson, OSG Security, ISGC20089 Security notices and incidents: –GOC receives notice at security address, filters spam and notifies security officer. –Analysis by security team, possible patch preparation by software team, and decision by security officer Software and Operations coordinators are part of security team –GOC sends notice to affected participants. GOC registration collects security contact info Security team plans “fire drills” run by GOC to test aspects of security infrastructure & response Inter-grid –OSG security officer in direct contact with EGEE and TeraGrid security officers Security Operations Example process: Critical Update

9 April 2008Olson, OSG Security, ISGC Additional Activities of the Security Team Vulnerability analysis of software stack Audit of VOs and sites –Starting with accuracy of security contacts Starting to monitor accounting data for irregular activities (using splunk) Working with CEDPS (Tierney et al.) on log collection for analysis/incident response OSG Registration Authority with DOEGrids CA (several thousand valid certificates) –Participated in CA audit for EUGridPMA Policies (lots of work)

9 April 2008Olson, OSG Security, ISGC Identity vetting in OSG RA Most Certificate Authorities use a “simple” identity vetting model, face-to-face presentation of photo ID to a registration agent. OSG RA uses a distributed “sponsorship model” where each registration agent develops list of known Sponsors who can vouch for the identity of a subscriber (person requesting a certificate). –Communications via signed or telephone. –Enables widely distributed RA network with normally a rapid processing time for requests. Discussed this model with EUGridPMA in January with aim to clarify understanding and include in Classic CA accreditation profile. Several other CA operators are interested in this model.

9 April 2008Olson, OSG Security, ISGC Metrics Timeliness of software patches –Goal is 95% of vulnerabilities have patch released within 1 week –Performance in past year 12 vulnerabilities 4.5 days average patch release time Longest – 13 days 3 vulnerabilities > 1 week

9 April 2008Olson, OSG Security, ISGC Example “fire drill” response Measure time to authentication failure following certificate revocation. Shows sites’ CRL update performance. Most sites update overnight. Few sites fail authN initially.

9 April 2008Olson, OSG Security, ISGC Controls Assessment Controls are assessed by one or more of –Interview –Examination –Test In fall of 2007 we performed assessment primarily by interview of service owners. –Was a lot of work. Lessons learned feed into update of security plan in 2008.

9 April 2008Olson, OSG Security, ISGC Interoperability Inter-grid –Communications between grid security officers –Incident response procedures –Shared PKI trust fabric and authN/authZ credential “standards” Policies –Participant in Joint Security Policy Group –Participant in IGTF/TAGPMA Infrastructure –Co-chair of Middleware Security Group (MWSG) –Identify and participate in specific projects VOMS/GUMS authZ architecture, FQAN standards glexec –Reliance on and coordination with external projects VO Services, VOMS, Condor, Globus, …

9 April 2008Olson, OSG Security, ISGC Education Awareness training is a key part of the NIST process. –Knowledgeable people are less risky than ignorant people. NIST control recommendations are: –Security Awareness and Training Policies and Procedures –Security Awareness –Security Training –Security Training Records OSG Controls –Awareness for Managers Briefing of the Executive Board –Role-based training (for Users, VO managers, Site Administrators, Management) Security briefings and discussions at All Hands Meetings Included in Grid School materials Included in Site Administrators meetings Included in Users Meetings –Weekly meetings of security team –Security addresses and mail lists

9 April 2008Olson, OSG Security, ISGC Developments and Directions Proxy cleanup – don’t leave old proxy credentials laying around CRL handling – ensure that sites use CRLs since GSI is “fail open” when CRL is missing Timely CA certificate updates by sites Ability to enforce or check limited proxy lifetimes Site user authZ suspension (bar banned DN) More secure communications for incident handling and analysis

9 April 2008Olson, OSG Security, ISGC Developments and Directions (2) Uniform FQANs across sites, grids – privileges are not uniformly interpreted or enforced Encourage federated Id management – would like grid credentials based on home institution or user facility authN Better (easier) management of 1000’s of host credentials – work in progress Simpler site security configuration management Better monitoring to identify & limit security incidents Advancing policies – still many incomplete and not yet existing policies Continue “fire drills” and develop more realistic “incidents”

9 April 2008Olson, OSG Security, ISGC Conclusion NIST model provides helpful guidance Iterative process is useful and we can look forward to several more iterations Interoperation/interoperability is challenging for security as in other aspects of grid –Incident response, information sharing, responsiveness of sites – all challenging The partnerships with EGEE and TeraGrid are very fruitful Bottom-line goal is to help the science and not hinder it.