Www.egi.eu EGI-Engage www.egi.eu Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.

Slides:



Advertisements
Similar presentations
Grid Security Policy GridPP18, Glasgow David Kelsey 21sr March 2007.
Advertisements

Grid Security Users, VOs, Sites OSG Collaboration Meeting University of Washington Bob Cowles August 23, 2006 Work supported.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Security Policy Group Summary EGI TF David Kelsey 6/28/
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI The EGI Software Vulnerability Group and EMI Dr Linda Cornwall, STFC, Rutherford.
EGI-InSPIRE The EGI Software Vulnerability Group (SVG) What is a Software Vulnerability?SVG membership and interaction with other groups Most people are.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Security Policy Group EGI Technical Forum Sep 2010 David Kelsey.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Future support of EGI services Tiziana Ferrari/EGI.eu Future support of EGI.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Handling Grid Security Vulnerabilities in.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Deployment Issues David Kelsey GridPP13, Durham 5 Jul 2005
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud F2F Security Issues in the cloud Introduction Linda Cornwall,
Evolution of the Open Science Grid Authentication Model Kevin Hill Fermilab OSG Security Team.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSVG issues handling Dr Linda Cornwall CCLRC.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
RI EGI-InSPIRE RI EGI Future activities Peter Solagna – EGI.eu.
Security Vulnerabilities Linda Cornwall, GridPP15, RAL, 11 th January 2006
15-Dec-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the Joint Security Policy Group) CERN 15 December 2004 David Kelsey CCLRC/RAL,
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud Security - what is needed Linda Cornwall (STFC) and the.
9-Oct-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security (Report from the LCG Security Group) FNAL 9 October 2003 David Kelsey CCLRC/RAL, UK
Grid Security Vulnerability Group Linda Cornwall, GDB, CERN 7 th September 2005
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
INFSO-RI Enabling Grids for E-sciencE EGEE SA1 in EGEE-II – Overview Ian Bird IT Department CERN, Switzerland EGEE.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI (Present and) Future of the EGI Services for WLCG Peter Solagna – EGI.eu.
The Grid Security Vulnerability Group (GSVG) Enabling Grids for E-sciencE EGEE-III INFSO-RI Eliminating and Preventing.
Trusted Virtual Machine Images a step towards Cloud Computing for HEP? Tony Cass on behalf of the HEPiX Virtualisation Working Group October 19 th 2010.
Security Policy Update David Kelsey UK HEP Sysman, RAL 1 Jul 2011.
Security Vulnerability Identification and Reduction Linda Cornwal, JRA1, Brno 20 th June 2005
Reflections “from around the block.” (Security) Ian Neilson GridPP Security Officer STFC RAL.
Security Policy: From EGEE to EGI David Kelsey (STFC-RAL) 21 Sep 2009 EGEE’09, Barcelona david.kelsey at stfc.ac.uk.
WLCG Laura Perini1 EGI Operation Scenarios Introduction to panel discussion.
Security Policy Update WLCG GDB CERN, 14 May 2008 David Kelsey STFC/RAL
Additional Services: Security and IPv6 David Kelsey STFC-RAL.
EGI-InSPIRE RI EGI EGI-InSPIRE RI Service Operations Security Policy the new generalised site operations security policy.
Evolving Security in WLCG Ian Collier, STFC Rutherford Appleton Laboratory Group info (if required) 1 st February 2016, WLCG Workshop Lisbon.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI SPG future work EGI Technical Forum Lyon, 21 Sep 2011 David Kelsey, STFC/RAL.
JSPG Update David Kelsey MWSG, Zurich 31 Mar 2009.
Security Vulnerability Detection and reduction Linda Cornwall MWSG, CERN 24 Feb 2005
Security Policy Update WLCG GDB CERN, 8 Dec 2010 David Kelsey STFC/RAL david.kelsey AT stfc.ac.uk.
Recent lessons learned: Operational Security David Kelsey CCLRC/RAL, UK GDB Meeting, BNL, 5 Sep 2006.
Why a Commercial Provider should Join the Academic Cloud Federation David Blundell Managing Director 100 Percent IT Ltd Simple, Flexible, Reliable.
3rd Helix Nebula Workshop on Interoperability among e-Infrastructures and Commercial Clouds Carmela ASERO, EGI.eu 17 September 2013, Madrid
INFSO-RI Enabling Grids for E-sciencE Joint Security Policy Group David Kelsey, CCLRC/RAL, UK 3 rd EGEE Project.
Ian Collier, STFC, Romain Wartel, CERN Maintaining Traceability in an Evolving Distributed Computing Environment Introduction Security.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Policy Development in EGI.eu/EGI-InSPIRE Damir Marinovic (EGI.eu)
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI CSIRT Procedure for Compromised Certificates and Central Security Emergency.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI VOMS Proxy Lifetime UCB 21 Aug 2012 David Kelsey STFC.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI UMD Roadmap Steven Newhouse 14/09/2010.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud and Software Vulnerabilities Linda Cornwall, STFC 20.
EGI-InSPIRE RI SPG Tasks for Year 2011 Jan 2011 Kelsey/Security Policy Group1.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Questionnaires to Cloud technology providers and sites Linda Cornwall, STFC,
Trusted Virtual Machine Images the HEPiX Point of View Tony Cass October 21 st 2011.
Grid Deployment Technical Working Groups: Middleware selection AAA,security Resource scheduling Operations User Support GDB Grid Deployment Resource planning,
Grid Security Policy: EGEE to EGI David Kelsey (RAL) 16 Sep 2009 JSPG meeting, DFN Berlin david.kelsey at stfc.ac.uk.
Cloud Security Session: Introduction 25 Sep 2014Cloud Security, Kelsey1 David Kelsey (STFC-RAL) EGI-Geant Symposium Amsterdam 25 Sep 2014.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI SA1.2 Plans 2013 Security Operations David Kelsey (STFC) 26/02/2013 Operations.
Ian Bird, CERN WLCG Project Leader Amsterdam, 24 th January 2012.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI D4.4 and the EGI review Dr Linda Cornwall 19 th Sept 2011 D4.41.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI SVG F2F Virtual Machines VM images, software run on VMS. 3 rd March 2015.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSVG issue handling summary Dr Linda Cornwall.
Directory/Inventory – info sharing for security people
EGI Software Vulnerability Group (SVG) report to CSIRT F2F
LCG Security Status and Issues
EGI Security Risk Assessment
Software Vulnerability Group Status update
David Kelsey (STFC-RAL)
Prevention is better than Cure
Dr Linda Cornwall STFC/RAL EGI OMB 27th September 2013
Presentation transcript:

EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure Dr Linda Cornwall, STFC. HEPiX Spring th March 2015 Linda Cornwall, STFC1

WLCG and EGI The (Worldwide) LHC Computing Grid and The European EGI Infrastructure share a lot of the same resources Also share Security teams and activities 24 th March 2015 Linda Cornwall, STFC. HEPiX Spring conference, Oxford 2

Contents Incident Prevention Policy definition Vulnerability handling Security monitoring Incident handling and incidents from the last year Evolving the work 24 th March 2015 Linda Cornwall, STFC. HEPiX Spring conference, Oxford 3

Security Incident Prevention Far more work goes into preventing incidents than handling them Security Policy definition Software Security, especially Software Vulnerability handling Security monitoring - monitoring for known vulnerabilities and insecure configuration 24 th March 2015 Linda Cornwall, STFC. HEPiX Spring conference, Oxford 4

Security Policy Definition Security Policy definition is carried out by the EGI Security Policy Group (SPG) Defines the behaviour expected from NGIs, Sites, Users and other participants to maintain a beneficial and effective working environment Output is various policy documents Parties read and sign, so that they know and understand what they should and should not do List of policy docs at: 24 th March 2015 Linda Cornwall, STFC. HEPiX Spring conference, Oxford 5

Minimizing vulnerabilities in the infrastructure Handling vulnerabilities found/reported Main activity of the EGI Software Vulnerability Group Assessing software for vulnerabilities Formally and informally Preventing new vulnerabilities being introduced Developer education, awareness Considering new software to be used in the infrastructure 24 th March 2015 Linda Cornwall, STFC. HEPiX Spring conference, Oxford 6

Software Vulnerability Handling Approved procedure (Under Revision) Anyone may report an issue By to This may be because they have found it in software Or it may be that it has been announced If it has not been announced, SVG contacts the software provider and the software provider investigates (with SVG member, reporter as appropriate ) 24 th March 2015 Linda Cornwall, STFC. HEPiX Spring conference, Oxford 7

Relevance and Risk The relevance to EGI is considered, and what affect it could have Then it is risk assessed, and put in 1 of 4 categories ‘Critical’, ‘High’, ‘Moderate’ or ‘Low’ If it has not been fixed, target date set ‘Critical’ 3 days, ‘High’ 6 weeks, ‘Moderate’ 4 months, ‘Low’ 1 year 24 th March 2015 Linda Cornwall, STFC. HEPiX Spring conference, Oxford 8

Advisory issued An advisory is issued when vulnerability is fixed if EGI SVG IS the main handler of vulnerabilities for this software, or software is in EGI UMD regardless of the risk. E.g. Grid Middleware, tools developed in EGI and collaborating projects If EGI is NOT the main handler, e.g.linux advisory only issued if ‘High’ or ‘Critical’ 24 th March 2015 Linda Cornwall, STFC. HEPiX Spring conference, Oxford 9

SVG message – if you find a vulnerability If it is NOT public knowledge DO NOT Discuss on a mailing list – especially one with an open subscription policy or which is archived publically Post information on a web page Publicise in any way without agreement of SVG DO report to SVG via 24 th March 2015 Linda Cornwall, STFC. HEPiX Spring conference, Oxford 10

High and Critical Vulnerabilities monitored Sites are monitored for ‘High’ and ‘Critical vulnerabilities. EGI CSIRT chases sites which are exposing ‘Critical’ vulnerabilities Sites may get suspended if they expose critical vulnerabilities and don’t respond Respond if asked to by IRTF/CSIRT For ‘High’ risk, up to the local NGIs. 24 th March 2015 Linda Cornwall, STFC. HEPiX Spring conference, Oxford 11

Vulnerabilities reported during last year 42 new entries in vulnerability tracker (RT) 12 concerned Grid Middleware - 2 critical (1related to heartbleed, 1 related to perfsonar/cacti) 4 high 16 Linux – 3 critical (heartbleed, Shellshock, Kernel) 5 high 4 Cloud enabling – 3 high 6 VO software – 3 high Others include 1 high 24 th March 2015 Linda Cornwall, STFC. HEPiX Spring conference, Oxford 12

Changing types of Vulnerabilities Until about 1 year ago most vulnerabilities concerned Grid Middleware Now more concerning VO specific software Including Data Protection issues VOs take it into their head to ‘monitor’ activities in a way that is traceable back to user Cloud specific software Less knowledge about this 24 th March 2015 Linda Cornwall, STFC. HEPiX Spring conference, Oxford 13

Incident Handling Approved Incident handling procedure Incidents are handed by the Incident Response Task Force. Fortunately there are not many Incident prevention is quite successful 24 th March 2015 Linda Cornwall, STFC. HEPiX Spring conference, Oxford 14

Incidents during last year (8) Primecoin mining (Policy violation) Open Hostkey leaking private information User cert mis-use Fed Cloud incident Due to bad endorsed VM UI compromised (4 user IDs compromized) Shellshock related compromises to Perfsonar nodes (multiple sites) Compromise due to port left open DDoS to some EGI services 24 th March 2015 Linda Cornwall, STFC. HEPiX Spring conference, Oxford 15

Evolving the Security Work Evolving the security work is necessary due to e.g. The EGI federated Cloud Changing responsibility model Changing technology Long Tail of Science Different trust model Have some H2020 funding for EGI engage to carry out this evolution 24 th March 2015 Linda Cornwall, STFC. HEPiX Spring conference, Oxford 16

Policy documents under revision Getting rid of ‘Grid’ Policies apply to all technology and services Acceptable use policy External draft – request for feedback and comments Use_Policy_March_2015 Security Policy for the endorsement and operation of Virtual Machine images Especially for Fed Cloud experience 24 th March 2015 Linda Cornwall, STFC. HEPiX Spring conference, Oxford 17

New policy documents Data Protection Policy Formerly only had “Grid Policy on the handling of User Level Job accounting data Finding Data protection policy needed as User level data is being monitored and exposed inappropriately. Long Tail of Science Policy Related to allowing access other than by large VOs, IGTF certificates User sub-proxy. 24 th March 2015 Linda Cornwall, STFC. HEPiX Spring conference, Oxford 18

Vulnerability handling evolution Now more software is coming into use where SVG members have no knowledge New members of SVG who know about cloud software, especially tools written within the community ‘Expert’ contact for all software Cloud enabling software deployed in the Fed Cloud VO software – assume VO security contact is responsible and know who to contact No more than 2 steps to the right person. 24 th March 2015 Linda Cornwall, STFC. HEPiX Spring conference, Oxford 19

Software security checking For some community cloud enabling software have a detailed ‘Technology provider’ questionnaire For other software propose something simpler:-- License details How long will it be under security support? How are security problems reported? Are security problems announced? Check compliance with Data Protection policy Some other simple technical checks – e.g. is user input is validated, bad constructs – not obviously bad 24 th March 2015 Linda Cornwall, STFC. HEPiX Spring conference, Oxford 20

Incident response evolution Changing responsibility model in the cloud will mean changes to incident response. A lot of work is going on including traceability – See Ian Collier’s talk 24 th March 2015 Linda Cornwall, STFC. HEPiX Spring conference, Oxford 21

Questions?? 24 th March 2015 Linda Cornwall, STFC. HEPiX Spring conference, Oxford 22

24 th March 2015 Linda Cornwall, STFC. HEPiX Spring conference, Oxford 23