EGI – Round table discussion

Slides:



Advertisements
Similar presentations
INFSO-RI Enabling Grids for E-sciencE Update on LCG/EGEE Security Policy and Procedures David Kelsey, CCLRC/RAL, UK
Advertisements

INFSO-RI Enabling Grids for E-sciencE Operational Security OSCT JSPG March 2006 Ian Neilson, CERN.
INFSO-RI Enabling Grids for E-sciencE Incident Response Policies and Procedures Carlos Fuentes
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks From ROCs to NGIs The pole1 and pole 2 people.
Operational Security Working Group Topics Incident Handling Process –OSG Document Review & Comments:
EGEE-II INFSO-RI Enabling Grids for E-sciencE AP ROC Min-Hong Tsai ASGC SA1 Transition Meeting May 8 th, 2008
EGEE ARM-2 – 5 Oct LCG Security Coordination Ian Neilson LCG Security Officer Grid Deployment Group CERN.
Enabling Grids for E-sciencE EGEE III Security Training and Dissemination Mingchao Ma, STFC – RAL, UK OSCT Barcelona 2009.
GGF12 – 20 Sept LCG Incident Response Ian Neilson LCG Security Officer Grid Deployment Group CERN.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Related Projects Dieter Kranzlmüller Deputy.
The EGI Blueprint: Grid Operations and Security Migration to the next grid operations era Tiziana Ferrari (Istituto Nazionale di Fisica Nucleare)
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks ?? Athens, May 5-6th 2009 Community Support.
Responsibilities of ROC and CIC in EGEE infrastructure A.Kryukov, SINP MSU, CIC Manager Yu.Lazin, IHEP, ROC Manager
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks EGEE – paving the way for a sustainable infrastructure.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
Bob Jones Technical Director CERN - August 2003 EGEE is proposed as a project to be funded by the European Union under contract IST
Training and Dissemination Enabling Grids for E-sciencE Jinny Chien, ASGC 1 Training and Dissemination Jinny Chien Academia Sinica Grid.
EGI – Security Training and Dissemination Mingchao Ma STFC – RAL, UK.
UKI ROC/GridPP/EGEE Security Mingchao Ma Oxford 22 October 2008.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks EGEE-EGI Grid Operations Transition Maite.
INFSO-RI Enabling Grids for E-sciencE External Projects Integration Summary – Trigger for Open Discussion Fotis Karayannis, Joanne.
LCG/EGEE Security Operations HEPiX, Fall 2004 BNL, 22 October 2004 David Kelsey CCLRC/RAL, UK
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks SA1: Grid Operations Maite Barroso (CERN)
Connect. Communicate. Collaborate Click to edit Master title style PERT OPERATIONS.
INFSO-RI Enabling Grids for E-sciencE EGEE SA1 in EGEE-II – Overview Ian Bird IT Department CERN, Switzerland EGEE.
EGEE-III-INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks EGEE-III All Activity Meeting Brussels,
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Business SSC for EGI SSC Workshop: Preparing.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks The EGEE User Support Infrastructure Torsten.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Operational Security Coordination Team Ian.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks EGI Operations Tiziana Ferrari EGEE User.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks ROC Security Contacts R. Rumler Lyon/Villeurbanne.
Security Operations David Kelsey GridPP Deployment Board 3 Mar 2005
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Robin McConnell NA3 Activity Manager 28.
Security Policy: From EGEE to EGI David Kelsey (STFC-RAL) 21 Sep 2009 EGEE’09, Barcelona david.kelsey at stfc.ac.uk.
WLCG Laura Perini1 EGI Operation Scenarios Introduction to panel discussion.
PIC port d’informació científica EGEE – EGI Transition for WLCG in Spain M. Delfino, G. Merino, PIC Spanish Tier-1 WLCG CB 13-Nov-2009.
EGEE ARM-2 – 5 Oct LCG/EGEE Security Coordination Ian Neilson Grid Deployment Group CERN.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Operations Automation Team Kickoff Meeting.
Operations model Maite Barroso, CERN On behalf of EGEE operations WLCG Service Workshop 11/02/2006.
Components Selection Validation Integration Deployment What it could mean inside EGI
INFSO-RI Enabling Grids for E-sciencE Joint Security Policy Group David Kelsey, CCLRC/RAL, UK 3 rd EGEE Project.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security aspects (based on Romain Wartel’s.
INFSO-RI Enabling Grids for E-sciencE Operational Security Coordination Team OSCT report EGEE-4, Pisa Ian Neilson, CERN.
Cloud Security Session: Introduction 25 Sep 2014Cloud Security, Kelsey1 David Kelsey (STFC-RAL) EGI-Geant Symposium Amsterdam 25 Sep 2014.
Ian Bird, CERN WLCG Project Leader Amsterdam, 24 th January 2012.
Bob Jones EGEE Technical Director
Regional Operations Centres Core infrastructure Centres
WISE 2017 Collaborating Communities
NA5: Policy and International Cooperation
SA1 Status Report EGEE Grid Operations & Management
SA1 Execution Plan Status and Issues
Integrated Management System and Certification
LCG Security Status and Issues
Ian Bird GDB Meeting CERN 9 September 2003
Steven Newhouse Project Director, EGI.eu
LCG/EGEE Incident Response Planning
NGI Operations readiness report
EGEE support for HEP and other applications
EGI Community Forum 2012 Munich, 29 March 2012
The CCIN2P3 and its role in EGEE/LCG
Romain Wartel EGEE08 Conference, Istanbul, 23rd September 2008
Maite Barroso, SA1 activity leader CERN 27th January 2009
Nordic ROC Organization
Connecting the European Grid Infrastructure to Research Communities
Leigh Grundhoefer Indiana University
Cécile Germain-Renaud Grid Observatory meeting 19 October 2007 Orsay
Pierre Girard ATLAS Visit
Hsin-Yen Chen 29 Aug APAN24 ASGC
David Kelsey (STFC-RAL)
Presentation transcript:

EGI – Round table discussion Romain Wartel EGEE08 Conference, Istanbul, 24th September 2008

UKI Current OSCT model is working very well Do not expect any dramatic change UKI ROC will maintain the same level of commitment to OSCT UKI ROC might also have a ROC level security team Current UK NGS will likely be NGI in the model of EGI; Not clear the relationship between NGS and GridPP in NGI

France Very similar to the situation in EGEE-III: Central coordination (EGI.org) NGI security contact supplied by gNOC (ROC equivalent in EGI) Formalized information channels between security officers of participating organisations inside the NGI and the NGI security contact Continuing use of JSPG documents Main difference would be to have a dedicated person for the NGI security contact Question: What will happen to MWSG and GSVG/RAT?

SWE OSCT must exist but focused on Policies Coordination Training Trusting structures EGI should push NGI to use the security infrastructure already in place, i.e. NREN CERTs Involving them into GRID environment

Italy Security operations will fall mainly under the responsibility of each region without, with its own NGI-CERT group for: Support for incident response Monitoring, training etc. Nevertheless a top “EGI-CERT (OSCT)” contact point is needed: Discussion Common activities planning Escalation of problems Inter-regional incident response coordination (EGI-CERT) At NGI level: Each NGI has a group (NGI-CERT) of security experts for incident response (possibly in collaboration with the “regional COD”) The “regional COD” should in any case be informed about incident reports and follow up (ex. via a common EGI security dashboard in addition to the usual “csirts” and “support” channels) At EGI level (for incidents involving multiple NGIs), EGI-CERT group replaces OSCT-DC Coordinates the incident when multiple regions are involved Coordinates the incident when VOs are involved Keeps contacts with other grids

CE Multiple MW stacks foreseen for EGI Increased number of NGIs More extensive expertise needed to get familiar with potential security weaknesses, etc. Increased number of NGIs CE is composed of eight countries, some of them are expected to form independent NGI ROCs may not exist in their current form All NGIs security contact should have proper expertise - “certification” and periodic training necessary Analogy to OSCT in terms of global incident response coordination Maintains channels to/from NGI's CSIRTs Providing services to NGI/ROC that want to outsource security tasks Requires intimate knowledge of NGI A 'security challenge' mechanism needed as part of training & channels establishment Basic security monitoring should be also performed at the EGI level Training/Introduction of NGI security contacts Together with TERENA's CSIRT activities? Applications expected to be more active (?)‏ Must be able to deal with security issues/incidents EGI.org/NGIs need to have proper channels to VO security contacts Security training of VO mgmt necessary - EGI.org could help

SEE Better coordination with local CSIRTs Work on raising awareness Produce documentation and guides Run frequently security Service Challenges Further develop current security monitoring services Moving to EGI will security coordination remain at the regional level or move to the NGI?

APROC APROC will be continuing supported by either the Taiwan NGI or Academia Sinica, and coping with EGI coordination framework Many Asian sites will join EGEE collaboration by the EU funded regional projects in 2 years, such as EUAsiaGrid, EU-IndiaGrid and EUChinaGrid, etc. All these sites will follow the operation policy/procedure conducted by APROC ROC has established an effective architecture for worldwide e-infrastructure operation and e-Science collaboration --> filling gaps between EGI and NGI Grid Security is about a federated trust domain, which is different from traditional information security Variant MW, site/national policy, expertise, technology, SOP, human resource, etc. in AP Effective and reliable communication channel to report security incident is critical APROC and EGI have to disseminate and notify all other Grid sites in the shortest time. Regional coordination is essential Regional Support Policy/SLA implementation, monitoring and auditing Technical Support Tools/Technology requirement and development Information and Training Service

APROC

DECH Improvements within EGEE sites are still necessary many sites have not much practical experience yet with incident response procedures Collaboration between EGEE- and D-Grid in the field of security should be improved (OSCT (IR) and GSVG, JSPG) Special incident reporting channels for Grid incidents are not established in D-Grid (National German Grid Initiative) yet. Discussion to put in place such channels or to use the 'normal' DFN-CERT-service should be resumed. Now with GOC-DB and roles of security officers for regions and sites a good status is achieved within EGEE. This could be used as a model for NGI's

NE Devolvement of tasks to NGIs as foreseen in EGI supports the already existing OSCT structure i.e. light central coordination, security tasks shifted to NGIs Given the variety of national legislations involved dealing with IT-privacy/security a more centralized Security Infrastructure will be very difficult to put in place It might be useful to offer support for security training installation/configuration/usage of the various security monitoring tools available Moving closer and closer to the existing NREN CERTS, so that in the future grid security becomes part of 'regular' CSIRT

Russia EGI should gradually adopt best practices from EGEE, particularly from OSCT – no need to break existing things: assimilate them. Collaboration between current Grid-wide and local security groups should be improved. Discussion channels between local CERT teams and Grid-wide security entities should be improved – both The number of sites in each ROC (will be called NGI?) will grow and many small sites can emerge – most of them will need security training and best practices guidance → EGI (or NGIs) will need to support this activity. All members of all security-related activities should start to discuss the new roadmap “just now” – perhaps some working group or mailing list will be useful.

Priorities for the OSCT Need to keep a structured team Also need to scale up with the number of NGIs If possible, several activities distributed in the NGIs (SSC software, etc.) Needs to be merge with NREN CERTs as much as possible Needs to scale-up our incident response operations (including peer grids) team

Discussion