What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Security Vulnerabilities Dr Linda Cornwall,
Advertisements

Summer IAVA1 NATIONAL INFORMATION ASSURANCE TRAINING STANDARD FOR SYSTEM ADMINISTRATORS (SA) Minimum.
Social Engineering Jero-Jewo. Case study Social engineering is the act of manipulating people into performing actions or divulging confidential information.
Computer Security: Principles and Practice
Network security policy: best practices
Incident Response Updated 03/20/2015
Website Hardening HUIT IT Security | Sep
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI The EGI Software Vulnerability Group and EMI Dr Linda Cornwall, STFC, Rutherford.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGI-InSPIRE The EGI Software Vulnerability Group (SVG) What is a Software Vulnerability?SVG membership and interaction with other groups Most people are.
INFSO-RI Enabling Grids for E-sciencE Incident Response Policies and Procedures Carlos Fuentes
HQ Expectations of DOE Site IRBs Reporting Unanticipated Problems and Review/Approval of Projects that Use Personally Identifiable Information Libby White.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Future support of EGI services Tiziana Ferrari/EGI.eu Future support of EGI.
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
The Grid Services Security Vulnerability and Risk Assessment Activity in EGEE-II Enabling Grids for E-sciencE EGEE-II INFSO-RI
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Handling Grid Security Vulnerabilities in.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Service Transition & Planning Service Validation & Testing
GGF12 – 20 Sept LCG Incident Response Ian Neilson LCG Security Officer Grid Deployment Group CERN.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Security Vulnerability Handling and.
Auditing Information Systems (AIS)
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud F2F Security Issues in the cloud Introduction Linda Cornwall,
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSVG issues handling Dr Linda Cornwall CCLRC.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
Update on the Grid Security Vulnerability Group Linda Cornwall, MWSG7, Amsterdam 14 th December 2005
Security Vulnerabilities Linda Cornwall, GridPP15, RAL, 11 th January 2006
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Grid Security Vulnerability Group Linda Cornwall, GDB, CERN 7 th September 2005
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
The Grid Security Vulnerability Group (GSVG) Enabling Grids for E-sciencE EGEE-III INFSO-RI Eliminating and Preventing.
Lecture 19 Page 1 CS 236 Online Securing Your System CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
COMMUNITY VISITOR TRAINING Quality Lifestyle Support Enhancing the Lives of Individuals.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
ITPD ISSUE MANAGEMENT PROCESS SEPTEMBER 5, 2008
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Vulnerability handling, Risk management,
Security Vulnerability Identification and Reduction Linda Cornwal, JRA1, Brno 20 th June 2005
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Services Security Vulnerability and.
Security Policy: From EGEE to EGI David Kelsey (STFC-RAL) 21 Sep 2009 EGEE’09, Barcelona david.kelsey at stfc.ac.uk.
Additional Services: Security and IPv6 David Kelsey STFC-RAL.
EGI-InSPIRE RI EGI EGI-InSPIRE RI Service Operations Security Policy the new generalised site operations security policy.
Role Of Network IDS in Network Perimeter Defense.
Introduction to ITIL and ITIS. CONFIDENTIAL Agenda ITIL Introduction  What is ITIL?  ITIL History  ITIL Phases  ITIL Certification Introduction to.
ASPEC January 2015 Incidents –0 incidents, 0 near misses Hours 27/12/14-30/01/15 13% Site, 1% Travel, 86% Office ASPEC QSHR January 2015 Minutes.
Introduction to Performance Testing Performance testing is the process of determining the speed or effectiveness of a computer, network, software program.
26/01/2007Riccardo Brunetti OSCT Meeting1 Security at The IT-ROC Status and Plans.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI CSIRT Procedure for Compromised Certificates and Central Security Emergency.
Gaspar Modelo-Howard NEEScomm Cybersecurity Software Engineer Saurabh Bagchi NEEScomm Cybersecurity Officer.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud and Software Vulnerabilities Linda Cornwall, STFC 20.
Scuola Grid - Martina Franca, Thursday 08 November Incident Response Guide Alfredo Pagano INFN – CNAF on.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Questionnaires to Cloud technology providers and sites Linda Cornwall, STFC,
Response to an Emergency Training for 211 Staff in Ontario Updated September
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Cloud Security Session: Introduction 25 Sep 2014Cloud Security, Kelsey1 David Kelsey (STFC-RAL) EGI-Geant Symposium Amsterdam 25 Sep 2014.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI SA1.2 Plans 2013 Security Operations David Kelsey (STFC) 26/02/2013 Operations.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI SVG F2F Virtual Machines VM images, software run on VMS. 3 rd March 2015.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSVG issue handling summary Dr Linda Cornwall.
Securing Network Servers
Directory/Inventory – info sharing for security people
EGI Software Vulnerability Group (SVG) report to CSIRT F2F
EGI Security Risk Assessment
Accident Reporting and Investigation. Presented by H&S Officer name
Software Vulnerability Group Status update
Prevention is better than Cure
HQ Expectations of DOE Site IRBs
ISSUE MANAGEMENT PROCESS MONTH DAY, YEAR
Presentation transcript:

What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform: Your local site security team Your NGI Security Officer And the EGI CSIRT Team via to Please give the following information in your initial report: Your name Your address Details of the incident If you do nothing else, and are really stuck, at least inform – they will help you. This MUST be done within 4 hours of discovering an incident. The incident will then be handled by the EGI Incident Response Task Force (IRTF) of the EGI Computer Security Incident Response Team (CSIRT) Security incidents are normally found by site administrators, but may be discovered by others. It is important that they are handled efficiently in a timely manner to minimize damage and prevent them spreading across the Grid. Software vulnerabilities also need to be handled in a timely manner to help prevent incidents. What if you find a software vulnerability? DO NOT discuss on a mailing list - especially one with an open subscription policy or public archive DO NOT post information on a web page DO NOT publicise in any way, especially to the media IMMEDIATELY report it to Talking about vulnerabilities openly exposes information that may be useful to an attacker Vulnerabilities reported are handled by the EGI Software Vulnerability Group (SVG) Incident handling When a security incident potentially affecting grid users, services or operations is suspected, the Incident handling procedure available from MUST be followed. Software Vulnerability issue handling procedure Software vulnerabilities are handled according to the EGI Software Vulnerability Issue handling procedure Most of the Issue handling is carried out by the SVG “Risk Assessment Team” or “RAT” Investigation The RAT, along with the reporter and software developers, establish whether the issue is real and what the potential effects of an exploit would be Risk Assessment A risk assessment is carried out by the RAT for all valid issues, where the issue is placed in 1 of 4 risk categories – Critical, High, Moderate, Low Target date for resolution set This is a fixed value for each risk category Critical – 3 days High – 6 weeks Moderate – 4 months Low – 1 year This allows the prioritization of fixing of issues, according to how serious they are. It is then up to the developers and software distributers to ensure the vulnerability is eliminated from the software available to the EGI infrastructure in time for the Target Date Advisory issued When the vulnerability is eliminated or on the target date – whichever is the sooner For more information on CSIRT activities please see the EGI CSIRT wiki EGI SVG and EGI CSIRT teams for the EGI Community forum Manchester 8-12 th April 2013 The EGI Software vulnerability Group (SVG) The purpose of the European Grid Infrastructure (EGI) Software Vulnerability Group (SVG) is “To eliminate existing vulnerabilities from the deployed infrastructure, primarily from the Grid Middleware, prevent the introduction of new ones and prevent security incidents” This is carried out in 3 main ways: Handling potential vulnerability problems reported Checking software for vulnerabilities (Vulnerability Assessment) Educating developers to write secure code The largest activity is vulnerability handling, which is the handling of vulnerabilities found by anyone (often site administrators, CSIRT members, developers and security experts from various projects) and reported to SVG. For more information, including advisories already issued publicly and other SVG activities see the EGI SVG wiki Site responsibilities after discovering an incident When a security incident potentially affecting grid users, services or operations is suspected, the following procedure MUST be followed: 1.Immediately inform your local security team, your NGI Security Officer and the EGI CSIRT via This step MUST be completed within 4 hours after the suspected incident has been discovered. 2.Do NOT reboot or power off the host. In case no support is shortly available, whenever feasible and, if admitted by your local security procedure and if you are sufficiently familiar with the host/service to take responsibility for this action, try to contain the incident. For instance by unplugging all connections (network, storage, etc.) to the host. Please note down carefully what actions you take with a timestamp; that would be very important for later analysis as well as if the incident ends up in a legal case. This step SHOULD be completed as soon as possible, and MUST be completed within one working day after the suspected incident has been discovered. 3.Confirm the incident, with assistance from your local security team and the EGI CSIRT. 4.If applicable, announce downtime for the affected hosts in accordance with the EGI operational procedures with “Security operations in progress” as the reason. If applicable, this step MUST be completed within one working day after the suspected incident has been discovered. 5.Perform appropriate analysis and take necessary corrective actions. Logging information such as IP addresses, timestamps and identities involved etc., concerning the source of any suspicious successful connection, must meet the minimal requirements specified in Appendix A of the procedure. The objective is to understand the source and the cause of the incident, the affected credentials and services, and the possible implications for the infrastructure. Throughout step 5, requests from the EGI CSIRT MUST be followed-up within 4 hours. 6.Coordinate with your local security team and the EGI CSIRT to send an incident closure report within 1 month following the incident to all the sites via including lessons learnt and resolution. This report should be labelled AMBER or higher, according to the Traffic Light 7.Restore the service and, if needed, update the service documentation and procedures to prevent recurrence as necessary.