Sponsored by the National Science Foundation Comprehensive GENI Security Program Spiral 2 Year-end Project Review National Center for Supercomputing Applications.

Slides:



Advertisements
Similar presentations
Sponsored by the National Science Foundation 1 August 30, 2010 GENI Shadownet Spiral 2 Year-end Project Review University of Kentucky, AT&T Research, and.
Advertisements

1 Spiral 1 Requirements Demonstrate GENI Clearinghouse & control framework in Spiral 1 projects as a central GENI concept. Demonstrate End-to-end.
Program Management Office (PMO) Design
The Value of a Project Management Office Copyright: Kathy J. Lang, 2004.
Sponsored by the National Science Foundation 1 Optical Access Nets and S3I Spiral 2 Year-end Project Review University at Buffalo PI: Chunming Qiao Students.
Sponsored by the National Science Foundation WIMXUWI Spiral 2 Year-end Project Review University of Wisconsin-Madison PI: Suman Banerjee Staff: Ben Willard.
Sponsored by the National Science Foundation 1 Activities this trimester 0.5 revision of Operational Security Plan Independently (from GPO) developing.
Sponsored by the National Science Foundation The Hive Mind: Applying a Security Sensor Network to GENI Spiral 2 Year-end Project Review University of California,
Enterprise Security A Framework For Tomorrow Christopher P. Buse, CPA, CISA, CISSP Chief Information Security Officer State of Minnesota.
Sponsored by the National Science Foundation LAMP Spiral 2 Year-end Project Review University of Delaware PI: Martin Swany Staff: Eric Boyd, Jason Zurawski,
Community Collaboration. Collaboration Leader Ability to guide the group towards the collaborations goals while seeking to include and explore all points.
Sponsored by the National Science Foundation Project PrimoGENI Spiral 2 Year-end Project Review Florida International University PI: Jason Liu;
Sponsored by the National Science Foundation 1 August 30, 2010 INSTOOLS Spiral 2 Year-end Project Review University of Kentucky PIs: James Griffioen and.
IS&T Project Management: How to Engage the Customer September 27, 2005.
Sponsored by the National Science Foundation netKarma Spiral 2 Year-end Project Review Indiana University Beth Plale (PI) School of Informatics and Computing.
Sponsored by the National Science Foundation BGP Mux Spiral 2 Year-end Project Review Georgia Tech PI: Nick Feamster Students: Valas Valancius, Yogesh.
Sponsored by the National Science Foundation IMF Spiral 2 Year-end Project Review Lead PI: Rudra Dutta Co-PI: George Rouskas Students: Anjing Wang, Can.
Sponsored by the National Science Foundation ProtoGENI and PGAugmentation Spiral 2 Year-end Project Review University of Utah, Internet2, HP Labs PI: John.
Sponsored by the National Science Foundation KanseiGenie Spiral 2 Year-end Project Review Ohio State University, Wayne State University PI: Anish Arora.
CONDUCTING EFFECTIVE MEETINGS
Sponsored by the National Science Foundation The Quilt GENI Operations Workshop Spiral 2 Year-end Project Review The Quilt PI: Jen Leasure August 31, 2010.
-Nikhil Bhatia 28 th October What is RUP? Central Elements of RUP Project Lifecycle Phases Six Engineering Disciplines Three Supporting Disciplines.
Sponsored by the National Science Foundation PlanetLab and PLFED Spiral 2 Year-end Project Review Princeton University PI: Larry Peterson Staff: Andy Bavier,
Sponsored by the National Science Foundation OppWireless Spiral 2 Year-end Project Review Howard University PI: Jiang Li Staff: Sankardas Roy (part-time.
Commonwealth of Massachusetts Statewide Strategic IT Consolidation (ITC) Initiative ANF IT Consolidation Website Publishing / IA Working Group Kickoff.
Federal Aviation Administration Federal Aviation Administration 1 Presentation to: Name: Date: Federal Aviation Administration AMHS Security Security Sub-Group.
Roles and Responsibilities
National Center for Supercomputing Applications University of Illinois at Urbana-Champaign Developing a Comprehensive GENI Cyber Security Program Adam.
Sponsored by the National Science Foundation GENI-enabled Campuses Responsibilities, Requirements, & Coordination Bryan Lyles, NSF Mark Berman & Chip Elliott,
Sponsored by the National Science Foundation Design of an Information Substrate for Measurement, Monitoring and Inference Spiral 2 Year-end Project Review.
Sponsored by the National Science Foundation Davis Social Links Spiral 2 Year-end Project Review University of California, Davis PI: S. Felix Wu, Chen-Nee.
Sponsored by the National Science Foundation GENI Meta-Operations Center Spiral 2 Year-end Project Review GlobalNOC at Indiana University PI: Jon-Paul.
Sponsored by the National Science Foundation Embedded Measurement Framework (ERM) Spiral 2 Year-end Project Review PI: Keren Bergman Students: Michael.
Sponsored by the National Science Foundation PGTools Spiral 2 Year-end Project Review University of Utah PI: John Regehr, Co-PI: Robert Ricci Staff: Leigh.
Sponsored by the National Science Foundation GENI Security Architecture Toolkit (GSAT) Spiral 2 Year-end Project Review SPARTA, Inc. PI: Stephen Schwab.
Sponsored by the National Science Foundation Campus Trials of Enterprise GENI: Georgia Tech Spiral 2 Year-end Project Review Georgia Tech PI: Russ Clark,
Sponsored by the National Science Foundation GENI Registry Services, a.k.a. Digital Object Registry Spiral 2 Year-end Project Review CNRI PI: Larry Lannom.
Sponsored by the National Science Foundation ExptsSecurityAnalysis Spiral 2 Year-end Project Review University of Alabama PI: Xiaoyan Hong, Fei Hu, Yang.
Community Board Orientation 6- Community Board Orientation 6-1.
Russ Housley IETF Chair Internet2 Spring Member Meeting 28 April 2009 Successful Protocol Development.
Software Engineering - I
Project Kick-off Meeting Presented By: > > > > Office of the Chief Information Officer.
Sponsored by the National Science Foundation Distributed Identity & Authorization Mechanisms Spiral 2 Year-end Project Review SPARTA, Inc. PI: Stephen.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Sponsored by the National Science Foundation Internet2 OpenFlow Backbone Spiral 2 Year-end Project Review Internet2 PI: Eric Boyd Co-PI: Matt Zekauskas.
Sponsored by the National Science Foundation CMUlab Spiral 2 Year-end Project Review Carnegie Mellon University PI: Dave Andersen Staff: Pat Gunn Students:
9-Oct-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security (Report from the LCG Security Group) FNAL 9 October 2003 David Kelsey CCLRC/RAL, UK
Sponsored by the National Science Foundation Spiral 2 Year-end Project Review PI: Staff: Students: Date Project Graphic and/or Photo.
Sponsored by the National Science Foundation Federating a CRON into ProtoGENI Spiral 2 Year-end Project Review Louisiana State University PI: Seung-Jong.
BSBPMG404A Apply Quality Management Techniques Apply Quality Management Techniques Project Quality Processes C ertificate IV in Project Management
Sponsored by the National Science Foundation OpenFlow Campus Trials at Clemson (OFCLEM) Spiral 2 Year-end Project Review Clemson University PI: Kuang-Ching.
Sponsored by the National Science Foundation Measurement System Spiral 2 Year-end Project Review University of Wisconsin, Colgate University, Boston University.
The Implementation of BPR Pertemuan 9 Matakuliah: M0734-Business Process Reenginering Tahun: 2010.
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
Neighbourhood Development Plan December 1 st, 2013.
Sponsored by the National Science Foundation Spiral 2 Year-end Project Review Rutgers University PI: Dipankar Raychaudhuri WINLAB, Rutgers University Co-PI:
Security Policy: From EGEE to EGI David Kelsey (STFC-RAL) 21 Sep 2009 EGEE’09, Barcelona david.kelsey at stfc.ac.uk.
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
ESSRT In-Process Review September 10, Agenda 1.Work Completed Till Date 2.Scope of future activities and deliverables 2.
Sponsored by the National Science Foundation WiMAX Spiral 2 Year-end Project Review Rutgers University PI: Dipankar Raychaudhuri, WINLAB Rutgers University.
Sponsored by the National Science Foundation OpenFlow: Princeton Spiral 2 Year-end Project Review Princeton University PIs: Michael Freedman, Jennifer.
Information Sharing for Integrated Care A 5 Step Blueprint.
The Project Management Process Groups
© Cloud Security Alliance, 2016 Brian Russell, Leidos Co-Chair, IoT WG 2 March 2016.
IS&T Project Reviews September 9, Project Review Overview Facilitative approach that actively engages a number of key project staff and senior IS&T.
Update from the Faster Payments Task Force
Information Sharing for Integrated care A 5 Step Blueprint
Firewall Management Task Force
Guidance for Proposers Day Slide
Guidance for Proposers Day Slide
Presentation transcript:

Sponsored by the National Science Foundation Comprehensive GENI Security Program Spiral 2 Year-end Project Review National Center for Supercomputing Applications PI: Adam Slagell Staff: N/A Students: N/A Aug. 30, 2010

Sponsored by the National Science Foundation 2 Project Summary Goal: Lay the ground work for a security and incident response program for GENI. Advancing Spiral 3 goals of making GENI operational Components –Threat and Risk Assessments –Document policies, agreements, standards and guidelines –Develop security plans How will incidents be addressed? What kind of proactive security measures can be deployed and maintained? INSERT PROJECT REVIEW DATE

Sponsored by the National Science Foundation 3 Milestone & QSR Status IDMilestoneStatusOn Time?On Wiki GPO signoff S2.aCatalog of relevant use cases v. 0.1Delivered as stated on time.On timeYes S2.bAsset Valuation and Risk Assessment report v. 0.1 Delivered as stated on time.On timeYes S2.cReview and Update of Asset Valuation and Risk Assessment report Review only consisted of phone call and comments from PO, no other stakeholders involved. IncompleteNo S2.dThreat & Vulnerability Report v. 0.1Delivered as stated on time.EarlyYes S2.eAggregate Provider Agreement v. 0.1Delivered as stated on time.EarlyYes S2.fInterim Operational Security PlanDelivered as stated on time.On timeYes S2.gReview and Update of Aggregate Provider Agreement Document updated on time & sent to PO. Call for review scheduled post-annual review. On timeNo QSR: 4Q2009We had a late start date.N/ANo QSR: 1Q2010It is on the wiki.On timeYes QSR: 2Q2010It is on the wiki.< 2 mo. late No INSERT PROJECT REVIEW DATE

Sponsored by the National Science Foundation 4 Accomplishments 1: Advancing GENI Spiral 2 Goals Our security work is only indirectly related to the main primary Spiral 2 goals –More directly focused on prep for Spiral 3 goals Continuous Experimentation Goal: –A more secure environment resulting from the contribution of this project will lead to increased participation and uptime Lack of security plans discourage campus IT from becoming involved –Unmitigated incidents are harmful to this goal. Integration Goal: –Our work is not aimed at technical integration. –The agreements we develop do address higher-level social integration Helps to define roles and responsibilities Sets expectations Lays out methods of communication INSERT PROJECT REVIEW DATE

Sponsored by the National Science Foundation 5 Accomplishments 2: Other Project Accomplishments Aggregate Provider Agreement Draft –Important to have in place as we move to operations –Forces discussion of important issues that need to be addressed E.g., roles and responsibilities, what it means to be a part of the GENI federation, etc. Interim Operational Security Plan –Based on an initial threat assessment of WiMAX and OpenFlow build-outs –First draft security incident response plan that includes cross-site collaboration –Identifies roles & responsibilities of the proposed team INSERT PROJECT REVIEW DATE

Sponsored by the National Science Foundation 6 Issues Challenging to get community feedback outside GEC –Mass ing has not proven effective & phone calls are only moderately more effective Difficult environment to present at GECs –Interruptions often prevent even short presentations from finishing Other presentations get bumped off schedule completely –Conversation / feedback is often dominated by a few individuals, but it is hard to gauge broad public opinion –Difficult to pick-up and finish these conversations offline after GEC Solutions –Work harder (and with GPO) to get ALL the interested parties on calls –Make sure participants read docs before the call to be more productive Perhaps have homework? Everyone submit at least 2 comments on wiki agenda before the call? Can test this for Aggregate Provider Agreement v0.2 –Polling to get broader opinion? –Saving comment period till after a presentation –Stricter enforcement of time limits by chairs to keep agenda moving INSERT PROJECT REVIEW DATE

Sponsored by the National Science Foundation 7 Plans Our focus changed mid-year and the SOW was reworked –Less on formal threat and risk analysis, more on agreements and security plans –Driven by immediate needs for plans with major build-outs Original SOW focused most on formal analysis, little focus on policy, nothing about agreements –Long time till any concrete plans would be developed Also the realization that a lot of the hardest operational security problems are social and not technical –Managed by focusing the scope of threat & risk analysis activities Focus on large projects & deployments GENI too large and diverse for a formal threat & risk assessment of the entire project even if the full 40% of an FTE is dedicated to that goal In the future, adjusting to a more pragmatic needs for the project –Establish sound agreements, procedures and protocols to handle security incidents –A major goal is to lay the foundation of guidelines and plans for a future operational incident response team –Provide a smooth transition from this development phase to normal operations of infrastructure Spiral 4 milestones will need to be reworked –E.g, developing plans for a large IDS is less relevant and unlikely to be built –Anticipate the need for additional agreements and policies For example nothing much has been said about privacy issues INSERT PROJECT REVIEW DATE