ONAP security meeting 2017-11-14.

Slides:



Advertisements
Similar presentations
SAFETYCHECK Eric Hatch | David Allen |Bailee Lucas| Austin Rhodes.
Advertisements

Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
CS682- Session 10 Prof. Katz. Well-Known Attacks By far the most common security vulnerabilities Attacks that Script-Kiddies are capable of performing.
Web-Enabling the Warehouse Chapter 16. Benefits of Web-Enabling a Data Warehouse Better-informed decision making Lower costs of deployment and management.
Bill Gates’ RSA 2006 Keynote presentation Questions and answers.
BSBPMG406A Apply Communications Management Techniques Apply Communications Management Techniques Unit Guide C ertificate IV in Project Management
IDESG Security Committee Charter Update. Objectives The Security Committee is responsible for defining a Security Model for the Identity Ecosystem Framework.
1 NTTC Training 2009 National Tax Training Committee AARP Tax Aide Helping Taxpayers.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud F2F Security Issues in the cloud Introduction Linda Cornwall,
Topic 1Topic 2Topic 3Topic 4Topic
Cullen Jennings Certificate Directory for SIP.
TIF-Security Update Robert Ono, IT Security Coordinator October 2010.
2016 Interoperability Standards Advisory Draft for comment Steve Posnack Director Office of Standards and Technology, ONC 1.
1 Session Number Presentation_ID © 2002, Cisco Systems, Inc. All rights reserved. Using the Cisco TAC Website for Security and Virtual Private Network.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
Query Health Distributed Population Queries Implementation Group Meeting October 11, 2011.
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
Real World App Development using Telerik ScreenBuilder and Progress Data Source – advanced Brian C. Preece Ypsilon Software Ltd
Taverna in App4Andy. Current status Version 1.0 – AWS-based NGS annotation pipeline – Completed Boran, N’Dama, Cape Buffalo Processed Watson data through.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Web Security.
Cyber Security and Open Source Community Call Seong K. Mun, PhD Don Hewitt, CISSP OSEHRA Arlington, Virginia Webex:
Windows Vista Configuration MCTS : Internet Explorer 7.0.
IEEE SISWG (P1619.3)‏ Messaging & Transport. AGENDA Transport Protocols & Channel Protection Messaging Layer Capability Exchange & Authentication Groups.
ONAP security meeting
CII badging program for ONAP ONAP security committee Stephen Terrill
ONAP security meeting
REVISIONS DATE SLIDE CHANGE 11/22/10
ONAP security meeting
ONAP security meeting
Working at a Small-to-Medium Business or ISP – Chapter 8
ONAP security meeting
100% REAL EXAM QUESTIONS ANSWERS
Joint ONAP security subcommittee – SDC and VNFSDK project meeting
Grades4sure PDF Dumps CompTIA Security + Certification Exam
SonarQube and Sonatype Nexus IQ Server
2. ISO Certification Discussed already at 2015 PoW and several WLCG OB meetings Proposed approach: An Operational Circular that describes the organisation's.
ONAP security meeting
Topics Introduction Structure and way of working
editor: Stephen Farrell,
Configuration Store in ONAP using Distributed KV Store (As part of making ONAP carrier grade) Consul.
Secure communication among services
ONAP security meeting
Certificate and Secret Management Services
Securing Cisco Networks with Threat Detection and Analysis practice-questions.html.
ONAP Software Architecture
Secret Server proposal
Securing Cisco Networks with Threat Detection and Analysis practice-questions.html.
ONAP Security Sub-committee Update
Download Latest CompTIA CAS-002 Exam Dumps PDF Questions - CAS-002 Best Study Material - Realexamdumps.com
NANC WG: TF Number Assignment Modernization
MODULE A - ADMINISTRATIVE
Proposal for future work
ONAP Beijing Architecture Chris Donley 1/9/18
Network Security – Kerberos
Progress Reports Form and Structure
Vermont Health Information Technology Plan (VHITP) Progress Update
OWASP Application Security Verification Standard
TG1 Draft Topics Date: Authors: September 2012 Month Year
Google Drive Use personal google account IF you actually know the password. Log on with school credentials if not: User:
Proposal on TSC policy for ONAP release Maintenance
IPP Workgroup Session, Day 1
AIXM 5.2 – WIP AIXM CCB – Webex 26 APR 2018.
ONAP-to-Edge Secure site reachability
Digital Transformation & Compile to Combat in 24 Hours (C2C24)
OWASP Application Security Verification Standard
ONAP Risk Assessment – Preparation Material - Overview of the Process - Terminology - Assumptions
OWASP Application Security Verification Standard
ONAP Security Requirements ONAP Virtual F2F, December overall requirements - security by design Stephen Terrill, et al.
Presentation transcript:

ONAP security meeting 2017-11-14

Agenda Information Update Topics to advance AOB Follow-up on Credential Management (Srinivasa) The expectation is that discussion with the AAF PTL has been done. Implications of TSC decision on 1 maintenance release from Vulnerability Management Perspective Static Code Scanning. https://wiki.onap.org/display/DW/ONAP+security+Recomendation+Developement, Status update of using Coverity. Next steps IIf time: Sonatype CLM / Nexus IQ Tool (management of dependencies and known vulnerabilities) Volunteer to start drafting a process proposal AOB

Static Code Scanning Use: https://wiki.onap.org/display/DW/ONAP+security+Recomendation+D evelopement section 3

Credential Management Use: https://wiki.onap.org/display/DW/ONAP+security+Recomendation+D evelopement section 2 Ambition: Are we ready to recommend. If not, what needs to be closed.

Nexus IQ Who volunteers to drive the process

Meeting Notes A question was raised about the security view of scanning of images. Is that something that we want to discuss and have a view in the security sub-committee. The answer was that it is something that we take a look at. Update on the proposal for certificate management. No discussion with AAF yet, dialogue started but ongoing. Proposal was updated to include broker capabilities as well as having CA capabilities.

Meeting Notes Secret Server Proposal (Srinivas Addepalli) Proposes a means to store information securely, one example and the focus is on passwords. How does the client authenticate to the secret service? 3 Choices for technology are presented. K8S secret service, Barbican, Vault. Security Code Scan. No blockers identified, to be checked with Phil.