Frameworks for harmonized policies and practices

Slides:



Advertisements
Similar presentations
David Groep Nikhef Amsterdam PDP & Grid Evolving Assurance – IGTF LoA generalisation David Groep Interoperable Global Trust Federation IGTF Documents at.
Advertisements

AARC Overview Licia Florio, David Groep 21 Jan 2015 presented by David Groep, Nikhef.
Sirtfi David Kelsey (STFC-RAL) REFEDS at TNC15 14 June 2015.
EResearchers Requirements the IGTF model of interoperable global trust and with a view towards FIM4R AAI Workshop Presenter: David Groep, Nikhef.
Authentication and Authorisation for Research and Collaboration Licia Florio AARC Workshop The AARC Project Brussels, 26 October.
Authentication and Authorisation for Research and Collaboration David Kelsey AARC AHM Milan And mechanisms NA3 Task 4 – Scalable.
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
Authentication and Authorisation for Research and Collaboration David Groep AARC All Hands meeting Milano Policy and Best Practice.
Federated Identity Management for Scientific Collaborations The Common Vision David Kelsey (STFC) 3 Nov 2011.
Authentication and Authorisation for Research and Collaboration David Kelsey AARC AHM Utrecht NA3 Task 4 – Scalable Policy Negotiation.
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
IGTF in 10 years enabling the interoperable global trust federation Nikhef, Amsterdam supported the Dutch national e-Infrastructure funded and coordinated.
SCI & Sirtfi David Kelsey (STFC-RAL) EGI Conference, Lisbon 19 May 2015.
Building Trust for Research and Collaboration
Assurance & Policy in Federated Incident Response
Introduction to AAI Services
WLCG Update Hannah Short, CERN Computer Security.
David Kelsey STFC-RAL 4th WISE workshop, Nikhef 27 March 2017
Boosting AAI for research and collaboration
RCauth.eu CILogon-like service in EGI and the EOSC
Cross-sector and user-centric AAI
The Policy Puzzle Many groups and (proposed) policies, but leaving many open issues AARC “NA3” is tackling a sub-set of these “Levels of Assurance” –
EGI Updates Check-in Matthew Viljoen – EGI Foundation
AARC Update What’s been happening in AARC which matters for GÉANT
Bring the WLCG federation Home
Policy and Best Practices … the Story So Far
eduTEAMS platform for collaboration Niels Van Dijk
Policy and Best Practice Harmonisation
Policy and Best Practices … the Story So Far
CheckIn: the AAI platform for EGI
AAI Alignment Nicolas Liampotis (based on the work of Mikael Linden)
Policy break-out session
Boosting AAI for research and collaboration
Incident Response for Federated Identities
Federated Identity Management for Scientific Collaborations
Bringing Harmonized Policy and Best Practice
Towards hamonized policies and best practices
The AARC Project Licia Florio (GÉANT) Christos Kanellopoulos (GRNET)
The AARC Project Licia Florio AARC Coordinator GÉANT
Minimal Level of Assurance (LoA)
GÉANT 4-2 JRA3 T1 and T2 Federations and Campus (CaFe) e-Infrastructures and Service Providers (RASP) Daniela Pöhn JRA3 T1 LRZ/DFN-AAI Technology Exchange.
Policy in harmony: our best practice
REFEDS Assurance Framework
Policy and Best Practice Harmonisation (‘NA3’)
Leveraging the IGTF authentication fabric for research
Leveraging the IGTF authentication fabric for research
Towards hamonized policies and best practices
Policy and Best Practice … in practice
WP3: Policy and Best Practice Harmonisation
AARC Athens AHM meeting – NA3 session
Updated (VO) Community Security Policies
Update - Security Policies
AARC Blueprint Architecture and Pilots
Supporting communities with harmonized policy
EUGridPMA Status and Current Trends and some IGTF topics March 2018 APGridPMA ISGC Meeting David Groep, Nikhef & EUGridPMA.
OIDC Federation for Infrastructures
AARC2 JRA1 Update Nicolas Liampotis
RCauth.eu CILogon-like service in EGI and the EOSC
WP3: Policy and Best Practice Harmonisation
FIM4R Requirements 5 minutes per slide!.
David Groep for the entire AARC Policy Team I2TechEX18 meeting
Community AAI with Check-In
David Groep for the entire AARC Policy Team AARC2 AHM4 meeting
Appropriate Access InCommon Identity Assurance Profiles
REFEDS Assurance WG REFEDS meeting 16 June 2019
Baseline Expectations for Trust in Federation
Combined Assurance Model
Federated Incident Response
Check-in Identity and Access Management solution that makes it easy to secure access to services and resources.
REFEDS Assurance Suite
Presentation transcript:

Frameworks for harmonized policies and practices The Story So Far … David Groep Activity Coordinator Dutch National Institute for sub-atomic Physics Nikhef DI4R 2018 November 2017

Touring the policy space in AARC Baseline Assurance known individual Password authenticator Documented vetting Persistent identifiers Self-assessment Fresh status attribute few unalienable expectations by research and collaborative services ‘low-risk’ use cases generic e-Infrastructure services access to common compute and data services that do not hold sensitive personal data protection of sensitive resources access to data of real people, where positive ID of researchers and 2-factor authentication is needed Slice includes: assumed ID vetting ‘Kantara LoA2’, ‘eIDAS low’, or ‘IGTF BIRCH’ Affiliation freshness better than 1 month Good entropy passwords Verified ID vetting ‘eIDAS substantial’, ‘Kantara LoA3’ Multi-factor authenticator supporting Researcher Community Assurance Operational Security bulk model 167 entities Supporting Infrastructures work as a coherent system Harmonising support for practices for communties 2

Security Incident Response in the Federated World All 4327 IdPs 2570 SPs 1763 How could we determine the scale of the incident? Do useful logs exist? Could logs be shared? Taking responsibility for resolving an incident How could we alert the identity providers and service providers involved? Enable information to be shared confidentially Today: 293 IdPs support R&S 188 IdPs from 18 feds support Sirtfi 63 IdPs (from 17 feds) support both … Security Incident Response Trust Framework for Federated Identity Sirtfi – based on Security for Collaborating Infrastructures (SCI) & FIM4R Recommendations see http://refeds.org/sirtfi

A Security Incident Response Trust Framework – Sirtfi summary Require that a security incident response capability exists with sufficient authority to mitigate, contain the spread of, and remediate the effects of an incident. Operational Security Assure confidentiality of information exchanged Identify trusted contacts Guarantee a response during collaboration Incident Response Improve the usefulness of logs Ensure logs are kept in accordance with policy Traceability Confirm that end users are aware of an appropriate AUP Participant Responsibilities see http://refeds.org/sirtfi

Permissing usage accounting across collective services Data collection necessary for ‘legitimate interests’ for Research and e-Infra Justification of global resource use, with infrastructures collecting data collaboratively Operational purposes: fault finding, researcher support, Incident response exchange of personal data is imperative – both for EIs and Research Collaboration funding roles are defined to limit access to personally identifiable data Global view needed for accounting data put in place policies on retention, permissible use, secure exchange, purpose limitation ‘binding’ - in the sense that a party can only remain in the club if it’s compliant policy suite identified by Security for Collaborating Infrastructures (SCI) group Policy coherency as enabler – model policies add as permissible purpose, but leave its scope to Sirtfi and existing forums Security Incident Response – data exchange

Three community models – three Recommendations? Global sharing in controlled communities appears attractive Uncertainly about requirements (governing body) and timing (> Mar 2018) are not helpful for adoption today … just yet Ongoing work: text needs to allow for (community) attribute authorities GDPR-style Code of Conduct – a new way from May 2018 Only works for tightly and ‘legal document’ controlled communities Puts legal and contract onus on the SP-IdP Proxy (as per our Blueprint) Research and Collaboration lack both mechanism and time to do this Model Clauses Note that this is not formally BCR, so requires acceptance of some risk Collaborations (e.g. based around Snctfi) with control mechanisms benefit “Say what you do, and do as you say” – transparency and openness is our real benefit towards the person whose data is being handled BCR-inspired model (“Binding Corporate Rules”-like)

Proxying not just AAI flow, but policy & practice as well  allow SPIdP Proxies to assert ‘qualities’, categories, based on assessable common trust  Develop recommendations and framework for a infrastructure coherent policy set  Snctfi Scalable Negotiator for a Community Trust Framework in Federated Infrastructures Derived from SCI, the framework on Security for Collaboration among Infrastructures Infrastructures would assert existing categories to IdPs: REFEDS R&S, Sirtfi, DPCoCo, … see http://igtf.net/snctfi

Ease the flow across infrastructures – targeting users & communities! ˃ Identify and support commonality between acceptable use policies (AUPs) So that a user that signed one of them need not be bothered again – and still move across silos Generic e-Infrastructures have a similar, but slightly diverged, AUP based on the Taipei Accord Realign the Taipei Accord concepts, and add a layered approach to support communities ˃ Support user communities implementing the gaps in Snctfi Reference practices for communities setting up their AAI With the central role of the community, you gain control and responsibilities ˃ Commonly agreed suite of Authentication Assurance Profiles Common Profiles accepted and deployed for all target groups Making the baseline a real baseline, and Cappuccino a common occurrence Align assurance between the generic e-Infrastructures to permit use to flow Stronger assurance for access to biomedical and human-related data

Everything meshed together … look for your favourite loop … and many more hubs and bridges, apologies if your logo is not here …

Snctfi infrastructure requirements, a summary State common security requirements: AAI, security, incident and vulnerability handling Ensure constituents comply: through MoUs, SLA, OLA, policies, or even contracts, &c Operational Security Awareness: users and communities need to know there are policies Have an AUP covering the usual Community registration and membership should be managed Have a way of identifying both individuals and communities Define the common aims and purposes (that really helps for data protection …) User Responsibilities Have a data protection policy that binds the infrastructure together, e.g. AARCs recommendations or DP CoCo Make sure every ‘back-end’ provider has a visible and accessible Privacy Policy Protection and Processing of Personal Data https://igtf.net/snctfi

Evolving the Policy Development Kit for communities around Snctfi … https://wiki.geant.org/display/AARC/Policy+Engagement+and+Coordination

Trusting the User’s Authentication Many layered models (3-4 layers) but: specific levels don’t match needs of Research- and e-Infrastructures: Specific combination ‘authenticator’ and ‘vetting’ assurance doesn’t match research risk profiles Disregards existing trust model between federated R&E organisations Cannot accommodate distributed responsibilities As a result, in R&E federation there was in practice hardly any documented and agreed assurance level Beyond uncontrolled identifiers: baseline assurance for research use cases 12

Differentiated assurance from an Infrastructure viewpoint ‘low-risk’ use cases few unalienable expectations by research and collaborative services generic e-Infrastructure services access to common compute and data services that do not hold sensitive personal data protection of sensitive resources access to data of real people, where positive ID of researchers and 2-factor authentication is needed Minimal Assurance known individual Persistent identifiers Documented vetting Password authenticator Fresh status attribute Self-assessment Slice includes: assumed ID vetting ‘Kantara LoA2’, ‘eIDAS low’, or ‘IGTF BIRCH’ Good entropy passwords Affiliation freshness better than 1 month Slice includes: Verified ID vetting ‘eIDAS substantial’, ‘Kantara LoA3’ Multi-factor authenticator see https://wiki.refeds.org/display/GROUPS/Assurance+Working+Group

Using Assurance in practice: mixing your favourite drink Identifiers ID proofing Authentication Attributes ID is unique, personal and traceable ePPN is unique, personal and traceable Good enough for institution’s local systems Assumed (e.g. postal credential delivery) Good entropy passwords Multi-factor authentication Accurate and fresh affiliation information Verified (e.g. F2F) Assurance can come from a single source … … or be a combined/collabative assurance by identifier source and vetting attributes See also the JRA1 Series Guidelines (1.1A) see also http://igtf.net/ap/loa and https://www.iana.org/assignments/loa-profiles

Engagement and global alignment  Use pre-existing groups and communities to develop policies and harmonise practices and thus avoid each infrastructure becoming yet another island Develop Adopt Through WISE and SCI REFEDS IGTF (FIM4R) … and all willing policy & CSIRT groups In your Infrastructure, IdP, and Federation Persistent, non-reassigned identifiers Incident Response capabilities & Sirtfi NG Protected personal data sharing Snctfi conformant policy models Self-assessment and peer review methods work with us by collaborating in these groups help collaboration progress by adopting results

davidg@nikhef.nl