ONAP security meeting 2017-09-22.

Slides:



Advertisements
Similar presentations
Harrison County Schools Professional Learning Community (PLC) Implementation Plan.
Advertisements

Leveraging User Interactions for In-Depth Testing of Web Applications Sean McAllister, Engin Kirda, and Christopher Kruegel RAID ’08 1 Seoyeon Kang November.
GLAST LAT ProjectCCB Review – April 1 st, 2005 GLAST LAT I&T Online A.T.Kavelaars 1 GLAST Large Area Telescope: I&T CCB Review April 1 st, 2005 E-Logbook.
SQA Architecture Software Quality.
Expediting Programmer AWAREness of Anomalous Code Sarah E. Smith Laurie Williams Jun Xu November 11, 2005.
Website Hardening HUIT IT Security | Sep
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Using the Cisco Technical Support & Documentation Website for Security.
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
The benefits of externalizing Web DMZ-as-a-Service in the Cloud James Smith, Sr. Security Sentrix
1 Session Number Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. Using the Cisco TAC Web Site for LAN Switching Issues Cisco TAC Web Seminar.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Security Development Life Cycle Baking Security into Development September 2010.
Grid Security Vulnerability Group Linda Cornwall, GDB, CERN 7 th September 2005
Sprint 116 Review / Sprint 117 Planning September 23th, 2013.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Rational Unified Process Fundamentals Module 4: Core Workflows II - Concepts Rational Unified Process Fundamentals Module 4: Core Workflows II - Concepts.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks EGEE Operations: Evolution of the Role of.
Maintaining and Updating Windows Server 2008 Lesson 8.
Biomedical Informatics Research Network BIRN as a Shared Infrastructure: An Overview of Policies & Procedures Mark James, Phil Papadopoulos October 9,
109-Mar-12 Quality Function Application Services What’s New in SPEED? - Release Updates March 2012.
Smashing WebGoat for Fun and Research: Static Code Scanner Evaluation Josh Windsor & Dr. Josh Pauli.
SLAs with Software Provider. Scope “…declare the rights and responsibilities between EGI.eu and the Software Provider for a particular component.” Which.
ONAP security meeting
ONAP Policy Framework Weekly Meeting June 7, 2017
CII badging program for ONAP ONAP security committee Stephen Terrill
ONAP security meeting
Documentation Guidelines
SharePoint Broken Link Manager
ONAP security meeting
Make-to-Stock Scenario Overview
Supporting quality devices
ONAP security meeting
CII Badging Program for CLAMP Xue Gao, Pierre Close, Anael Closson
Overview – SOE PatchTT November 2015.
ONAP security meeting
Discussion to clarify online/offline behavior
Topics Introduction Structure and way of working
Finding and Fighting the Causes of Insecure Applications
^ About the.
Building a Distributed Earth System Model Community
ONAP security meeting
Make-to-Stock Scenario Overview
Consumer Cloud Monitoring – Beta Sprint Demo
Securing Cisco Networks with Threat Detection and Analysis practice-questions.html.
ONAP security meeting
Securing Cisco Networks with Threat Detection and Analysis practice-questions.html.
ONAP Security Sub-committee Update
Malwarebytes Updating Automatically
Intercept X for Server Early Access Program Sophos Tester
ITIL: Why Your IT Organization Should Care Service Support
ITIL: Why Your IT Organization Should Care Service Support
Gateway to Competency Portability
Software Vulnerability Group Status update
SharePoint Broken Link Manager
CVE.
Site scripts and Site Design
Finding and Fighting the Causes of Insecure Applications
NASA Personal Identity Verification (PIV) High Level System Overview Tice F. DeYoung, PhD 14th Fed/Ed Workshop December 14, 2006.
Rambl: Hi-Fi Midway Milestone
ITIL: Why Your IT Organization Should Care Service Support
OWASP Application Security Verification Standard
Proposal on TSC policy for ONAP release Maintenance
Монголын даатгалын зах зээлийн бодлогын асуудлууд
ONAP Release Planning DRAFT Proposal
OWASP Application Security Verification Standard
OWASP Application Security Verification Standard
What Does it Mean to Get Gold in CII Badging?
ONAP Security Requirements ONAP Virtual F2F, December overall requirements - security by design Stephen Terrill, et al.
Presentation transcript:

ONAP security meeting 2017-09-22

Agenda Information update Credentials Protection and Management - Credentials Protection and Management PKI infrastructure and CA Code Scanning update? Vulnerability Management September Developers event CII Badging for CLAMP AOB

Credentials Management – PKI Automation Status There is a proposal for a credential vault, and a ability to provision ONAP with the credentials. This site has been created to capture the results of the discussion: https://wiki.onap.org/display/DW/ONAP+security+Recomendations Way forward Document a proposal Evgeny, has a usecase description that could be used as a basis.

Static Code Scanning Coverity appears to be a good tool Fortify is another alternative Question to Phil about coverity (Stephen). Question: What shall we put here: https://wiki.onap.org/display/DW/ONAP+security+Recomendations

CII Badging Questions - CLAMP Eve CII Badging Questions - CLAMP The CLAMP team asked for clarification on some of the CII requirements Provide the Security subteam team the URLs for CVE listings The release notes MUST identify every publicly known vulnerability that is fixed in each new release. This is “N/A” if there are no release notes or there have been no publicly known vulnerabilities Clarify which warnings be raised by a software component Requirement: It is SUGGESTED that projects be maximally strict with warnings in the software produced by the project, where practical. Some warnings cannot be effectively enabled on some projects. What is needed is evidence that the project is striving to enable warning flags where it can, so that errors are detected early

Vulnerability Management Vulnerability to test the procedure?

September Event Update from CII badging – feedback Static code scanning Credential Management. Action: Stephen to put this on the F2F dev event request for September.