Page: 1 24-26 October 2006 © 2006 VIVACE Consortium Members. All rights reserved VIVACE FORUM 2 +33 (0)5 61 55 60 86 {mkamel, benzekri, barrere, nasser}

Slides:



Advertisements
Similar presentations
Identity Network Ideals – Heterogeneity & Co-existence
Advertisements

All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
NRL Security Architecture: A Web Services-Based Solution
D-BP-ISP An Electronic B2B Procurement and ERP Integration Model for SC Optimization.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
E-Business Risks Chapter Seven. E-Business Models EDI Web pages The online environment Distributed e-business and intranets Supply chain linkage Collaborative.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
Network and Security Patterns
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Page: October 2006 © 2006 VIVACE Consortium Members. All rights reserved VIVACE FORUM 2 Deploying a distributed access control architecture within.
Fluff Matters! Information Governance in an Online Era Lisa Welchman.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Understanding Active Directory
Course 201 – Administration, Content Inspection and SSL VPN
Security Guide for Interconnecting Information Technology Systems
Virtual Private Networks Alberto Pace. IT/IS Technical Meeting – January 2002 What is a VPN ? u A technology that allows to send confidential data securely.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
SecureAware Building an Information Security Management System.
Intranet, Extranet, Firewall. Intranet and Extranet.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
Joseph Ferracin Director IT Security Solutions Managing Security.
Internet Security for Small & Medium Business Week 6
SODA Archiving October 2013
Grid Security Issues Shelestov Andrii Space Research Institute NASU-NSAU, Ukraine.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
FINAL YEAR PROJECT. FINAL YEAR PROJECT IMPLEMENTATION OF VPN USING IPSEC.
Database Administration
9-Oct-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security (Report from the LCG Security Group) FNAL 9 October 2003 David Kelsey CCLRC/RAL, UK
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
DG CONNECT NIPS Study – CONSULTATION CONFERENCE 13 November 2013
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
IS3220 Information Technology Infrastructure Security
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Security Bob Cowles
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Virtual Private Networks
Virtual Private Networks
Dr. Ir. Yeffry Handoko Putra
CS457 Introduction to Information Security Systems
Virtual Private Networks
Virtual Private Networks
Public Sector Institutional Reform Project
Virtual Private Networks (VPN)
Grid Computing B.Ramamurthy 9/22/2018 B.Ramamurthy.
IS4680 Security Auditing for Compliance
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Page: October 2006 © 2006 VIVACE Consortium Members. All rights reserved VIVACE FORUM (0) {mkamel, benzekri, barrere, IT security for smaller businesses Michel Kamel, Abdelmalek Benzekri, François Barrère, Bassem Nasser Université Paul Sabatier – IRIT Toulouse, France

Page: October 2006 © 2006 VIVACE Consortium Members. All rights reserved VIVACE FORUM 2 The domains of interest of IRIT within the VIVACE project are the design of solutions that should be deployed to ensure connectivity and security within the Virtual Organization. Concepts such as authentication, authorization, access control, security policies and security practices within a VO environment are being considered in order to deploy an infrastructure supporting the secure share and exchange of information between partners within the VO. Aspects, relevant to third tier suppliers for supporting the supply chain members are studied deeply. IRIT Involvement

Page: October 2006 © 2006 VIVACE Consortium Members. All rights reserved VIVACE FORUM 2 The “Virtual Organization” Type of collaboration ICT mediated business organization Needs for the pooling of more than one core competencies within small ‘specialists’ companies Memorandum of Understanding = Contractual Agreement  Common understanding/common vision and work towards shared goals  Sophisticated ICT infrastructures and mutual confidence  efficiency determined by the speed and efficiency with which information can be exchanged and managed among business partners.

Page: October 2006 © 2006 VIVACE Consortium Members. All rights reserved VIVACE FORUM 2 The VO concept and the 3TS support

Page: October 2006 © 2006 VIVACE Consortium Members. All rights reserved VIVACE FORUM 2 A global security policy should be deployed within the VO network. This security policy is not a new one but should be considered as an extension of the different security policies defined on each partner’s site. The Common IT Security approach within the VO is intended to merely enable organizations to extend their IT Security Policy in the leanest and most efficient way. This security policy must ensure privacy and security for 3TS. The VO security policy

Page: October 2006 © 2006 VIVACE Consortium Members. All rights reserved VIVACE FORUM 2 The shared IT infrastructure deployed to support the VO type of networks must guarantee these base services: Security services:  Confidentiality and integrity  Authentication  Authorization  Single Sign On Control and management services:  Identity management  Access control management  Audit and log management  Network management using tools such as firewalls, routers, NIDS, etc. VO IT infrastructure base services

Page: October 2006 © 2006 VIVACE Consortium Members. All rights reserved VIVACE FORUM 2 Confidentiality and integrity services are ensured using security protocols (IPsec, SSL, etc.) and security equipments (firewalls, routers, IDS, etc.). Protocols:  IPsec  SSL  … Equipments:  Firewalls and routers  IDS  … VO confidentiality and integrity services

Page: October 2006 © 2006 VIVACE Consortium Members. All rights reserved VIVACE FORUM 2 A VPN IPsec solution can be deployed to ensure an encrypted tunnel between separated sites; this tunnel will be used to transmit data securely between the partners’ sites. VO confidentiality and integrity services

Page: October 2006 © 2006 VIVACE Consortium Members. All rights reserved VIVACE FORUM 2 Access control is realized through two security services: authentication and authorization. A formal approach must be adopted to specify an access control policy. Access control models such as RBAC or OrBAC could be used. Once modeled, the access control policy must be enforced. For access control policy enforcement, infrastructures for identification, authentication and authorization must be used. PKIs are satisfactory for identification and authentication, but they don’t provide a solution for authorization. VO access control service

Page: October 2006 © 2006 VIVACE Consortium Members. All rights reserved VIVACE FORUM 2 During all the VO lifecycle, security problems are faced. The interconnection of partners’ information systems must preserve that each partner keeps control on its own resources. An access control policy suitable for a dynamic trans- organizational environment should be deployed. A distributed management infrastructure should be implemented. Users roles must be defined and managed VO access control service

Page: October 2006 © 2006 VIVACE Consortium Members. All rights reserved VIVACE FORUM 2 Definition of an information security management process; this process will ensure a secure exchange and share of information between partners. It will guarantee these properties:  information confidentiality,  information integrity,  information availability, and  Information non-repudiation Security practices implemented must be parts of the global VO’s information security policy and must guarantee that this policy is respected by different users and partners. Information Security management process

Page: October 2006 © 2006 VIVACE Consortium Members. All rights reserved VIVACE FORUM 2 The Information Security Management process that we adopt in order to deploy a secure shared IT infrastructure for the VO type of networks is:  Use risk management methods such as Ebios, Mehari, etc.  Use the ISO/IEC and the ISO/IEC standards to build, operate, maintain and improve an ISMS (Information Security Management System).  Define a tool that allows SMEs administrators to evaluate the security practices’ maturity level implemented within their infrastructures to ensure Identity and Privilege management, business continuity, etc. The evaluation will be realized compared to the ISO/IEC directives. This tool provides a solution to quantify trust between partners. Information Security management process

Page: October 2006 © 2006 VIVACE Consortium Members. All rights reserved VIVACE FORUM 2 Thank You Any Questions ?