The Grid Services Security Vulnerability and Risk Assessment Activity in EGEE-II Enabling Grids for E-sciencE EGEE-II INFSO-RI-031688

Slides:



Advertisements
Similar presentations
Grid Security Policy GridPP18, Glasgow David Kelsey 21sr March 2007.
Advertisements

EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Security Vulnerabilities Dr Linda Cornwall,
INFSO-RI Enabling Grids for E-sciencE Update on LCG/EGEE Security Policy and Procedures David Kelsey, CCLRC/RAL, UK
INFSO-RI Enabling Grids for E-sciencE Operational Security OSCT JSPG March 2006 Ian Neilson, CERN.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE-III Program of Work Erwin Laure EGEE-II / EGEE-III Transition Meeting CERN,
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI The EGI Software Vulnerability Group and EMI Dr Linda Cornwall, STFC, Rutherford.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGI-InSPIRE The EGI Software Vulnerability Group (SVG) What is a Software Vulnerability?SVG membership and interaction with other groups Most people are.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
INFSO-RI Enabling Grids for E-sciencE Incident Response Policies and Procedures Carlos Fuentes
EMI SA2: Quality Assurance (EMI-SA2 Work Package) Alberto Aimar (CERN) WP Leader.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Handling Grid Security Vulnerabilities in.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
GGF12 – 20 Sept LCG Incident Response Ian Neilson LCG Security Officer Grid Deployment Group CERN.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks The Grid Security Vulnerability Group Dr.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Security Vulnerability Handling and.
Deployment Issues David Kelsey GridPP13, Durham 5 Jul 2005
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSVG issues handling Dr Linda Cornwall CCLRC.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Ake Edlund EGEE Sec Head 9th MWSG meeting, SLAC,
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
Training and Dissemination Enabling Grids for E-sciencE Jinny Chien, ASGC 1 Training and Dissemination Jinny Chien Academia Sinica Grid.
Update on the Grid Security Vulnerability Group Linda Cornwall, MWSG7, Amsterdam 14 th December 2005
Security Vulnerabilities Linda Cornwall, GridPP15, RAL, 11 th January 2006
JRA Execution Plan 13 January JRA1 Execution Plan Frédéric Hemmer EGEE Middleware Manager EGEE is proposed as a project funded by the European.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Linda Cornwall CCLRC (RAL) FP6 Security workshop.
LCG/EGEE Security Operations HEPiX, Fall 2004 BNL, 22 October 2004 David Kelsey CCLRC/RAL, UK
15-Dec-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the Joint Security Policy Group) CERN 15 December 2004 David Kelsey CCLRC/RAL,
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks SA1: Grid Operations Maite Barroso (CERN)
Grid Security Vulnerability Group Linda Cornwall, GDB, CERN 7 th September 2005
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
INFSO-RI Enabling Grids for E-sciencE EGEE SA1 in EGEE-II – Overview Ian Bird IT Department CERN, Switzerland EGEE.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Dr Linda Cornwall CCLRC (RAL) FP6 Security workshop.
The Grid Security Vulnerability Group (GSVG) Enabling Grids for E-sciencE EGEE-III INFSO-RI Eliminating and Preventing.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks EGI Operations Tiziana Ferrari EGEE User.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks ROC Security Contacts R. Rumler Lyon/Villeurbanne.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Security Threat Risk Assessment Dr Linda Cornwall Rutherford Appleton.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Vulnerability handling, Risk management,
Security Operations David Kelsey GridPP Deployment Board 3 Mar 2005
Security Vulnerability Identification and Reduction Linda Cornwal, JRA1, Brno 20 th June 2005
INFSO-RI Enabling Grids for E-sciencE Security Summary Åke Edlund, JRA3 4 th EGEE Conference Pisa, Italy 28 th October 2005.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Services Security Vulnerability and.
Security Policy: From EGEE to EGI David Kelsey (STFC-RAL) 21 Sep 2009 EGEE’09, Barcelona david.kelsey at stfc.ac.uk.
Additional Services: Security and IPv6 David Kelsey STFC-RAL.
Security Vulnerability Detection and reduction Linda Cornwall MWSG, CERN 24 Feb 2005
18-May-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the LCG Security Group) Barcelona 18 May 2004 David Kelsey CCLRC/RAL, UK
Planning for LCG Emergencies HEPiX, Fall 2005 SLAC, 13 October 2005 David Kelsey CCLRC/RAL, UK
Recent lessons learned: Operational Security David Kelsey CCLRC/RAL, UK GDB Meeting, BNL, 5 Sep 2006.
Grid Security Update David Kelsey (RAL) HEPiX, LBNL 28 Oct 2009.
INFSO-RI Enabling Grids for E-sciencE Joint Security Policy Group David Kelsey, CCLRC/RAL, UK 3 rd EGEE Project.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud and Software Vulnerabilities Linda Cornwall, STFC 20.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security aspects (based on Romain Wartel’s.
Grid Deployment Technical Working Groups: Middleware selection AAA,security Resource scheduling Operations User Support GDB Grid Deployment Resource planning,
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Ake Edlund for JRA3 EGEE EU Review (CERN) May 23-24, 2006.
INFSO-RI Enabling Grids for E-sciencE JRA3 Åke Edlund On behalf of JRA3 EGEE 8th All-activity meeting January 18-19,
15-Jun-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the LCG Security Group) CERN 15 June 2004 David Kelsey CCLRC/RAL, UK
EGEE-II Enabling Grids for E-sciencE EGEE and gLite are registered trademarks The Grid Security Vulnerability Group Activity in Central.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSVG issue handling summary Dr Linda Cornwall.
JRA1 Middleware re-engineering
Bob Jones EGEE Technical Director
SA1 Execution Plan Status and Issues
Vulnerability Handling – experience from the October Torque issue
EGI Software Vulnerability Group (SVG) report to CSIRT F2F
Ian Bird GDB Meeting CERN 9 September 2003
Grid Services Security Vulnerability and Risk Analysis
Romain Wartel EGEE08 Conference, Istanbul, 23rd September 2008
David Kelsey CCLRC/RAL, UK
EGI Security Risk Assessment
Prevention is better than Cure
Presentation transcript:

The Grid Services Security Vulnerability and Risk Assessment Activity in EGEE-II Enabling Grids for E-sciencE EGEE-II INFSO-RI The Grid Security Vulnerability Group (GSVG) Why the GSVG began The GSVG started work before the beginning of EGEE-II, using GridPP funded effort and some voluntary effort. It was noted that a lot was being done concerning Grid Security functionality, such as authentication and authorization, but little was being done to ask “is the Grid secure?” We were aware that the software isn’t perfect, that some vulnerabilities were in the process of being fixed and suspected that others were there waiting to be exploited. The Hackers conference HOPE has mentioned Grids, so unfriendly people (generally without credentials) are aware of us so “security through obscurity” cannot be relied upon. In EGEE-II the GSVG is a task within SA1, the Grid Operations Support and management activity. It is called the Grid Services Security Vulnerability and Risk Assessment Activity. The aim is “To incrementally make the Grid more secure and thus provide better availability and sustainability of the deployed infrastructure”. The main aim is to prevent Grid Security incidents. The handling of specific issues, which may be identified by anyone, is the main activity for this task. GSVG in EGEE-II Grid Security Vulnerability Issue handling An Issue is submitted Anyone can submit an issue The GSVG checks the validity and carries out a Risk Assessment According to an agreed strategy A Target Date for resolution is set according to Risk Assuming the issue results in a bug, using an agreed formula The issue is then in the hands of the Developers and the EGEE-II Engineering Management Team (EMT) The EMT co-ordinates the fixing of the issue and the release An advisory is issued when the problem is fixed or on the Target Date, whichever is the sooner When the issue is fixed the advisory is included in the release notes Risk Assessments Risk Assessments are carried out by the “Risk Assessment Team” or ”RAT”, which consists of various software security experts and experienced system administrators. A lot of work went into establishing the strategy for carrying out Risk Assessments, and many people were consulted including site security officers. Site security officers most fear an attack that gives access to the whole site, especially if it can by carried out anonymously. Denial of Service is considered no more than medium risk. A vulnerability that can be exploited by an authorized user is considered by most less serious than one that can be exploited without credentials, especially if actions are clearly logged. The possibility that credentials may be stolen cannot be ignored. Issues that can be exploited trivially and reliably are considered more serious than those that are harder to exploit or can only be exploited in rare circumstances. 4 Risk Categories Extremely Critical – Target Date = 2 days High – Target Date = 3 weeks Moderate – Target Date = 3 months Low – Target Date = 6 months Basic Interactions with other groups in EGEE-II Most issues of which we are informed are bugs in the middleware, which are handled by issuing a patch. Some are operational issues, which do not require a patch in the middleware – for these we issue an advisory to the Operational Security Co-ordination Team (OSCT). Some are more general issues, these are discussed with the EGEE-II technical co-ordination Group and the security Co-ordination group. Types of Grid Security Vulnerability issues Anyone! OSCT GSVG TCG EMT + developers SCG disclosure Operational issue Issue submission Security bug in middleware (most issues) Patch available with advisory Patch not available on Target Date Missing functionality and other general concerns are discussed with TCG and SCG Operational Security Coordination Team MiddleWare Security Group EUGridPMA Joint Security Policy Group Grid Security Vulnerability Group The GSVG is one of several security related activities in EGEE-II, and interacts with each of these activities. These activities are The Joint Security Policy Group (JSPG) which considers policy. The MiddleWare Security Group (MWSG) which considers architecture and security design and interoperability of the middleware, The Operational Security Co-ordination Team (OSCT) which considers operational issues, and the EUGridPMA which considers certificate handling and trust. The Chairs of these activities form the Security Co-ordination Group (SCG), which is responsible for ensuring overall security co-ordination. The goal is to ensure the relationship between the various security related work items does not overlap or leave gaps that could be exploited. What to do if you find a Grid Security Vulnerability This is what happens – to first order If you find a Grid Security vulnerability, or think you have found a vulnerability please send an to Alternatively, if you are familiar with the LCG Savannah you may enter the issue as a ‘bug’ in the GSVG savannah at for obvious reasons these bugs are set to ‘private’ so you cannot browse these bugshttps://savannah.cern.ch/projects/grid-vul/ The GSVG will investigate the issue, and inform you of the findings. We will also inform you of progress if the issue results in a software bug. Please refrain from discussing vulnerabilities on open mailing lists. Note that if a security vulnerability has been exploited it is considered to be an security incident, and should be reported according to the EGEE incident response procedure at Author List Linda Cornwall (RAL), Stephen Burke (RAL), Vincenzo Ciaschini (INFN), Akos Frohner (CERN), David Kelsey (RAL), Oscar Koeroo (NIKHEF), Daniel Kouril (ICS), Kalman Kovari (KFKI-RMKI), Maarten Litmaath (CERN), Eygene Ryabinkin (RCC-KI), Ake Sandgren (HPC2N), John Walsh (TCD), Romain Wartel (CERN) CERN, CH-1211, Geneve 23, Switzerland HPC2N, Umea University, S Umea, Sweden ICS, Czech republic INFN, Instituto Nazionale di Fisica Nucleare, Italy KFKI-RMKI, Hungary NIKHEF The National Institute for Nuclear Physics and High Energy Physics, Kruislaan 409, 1098 Amsterdam, The Netherlands RAL, Science and Technology Facilities Council, The Rutherford Appleton Laboratory, Harwell Science and Innovation Campus, Didcot, OX11 OQX, England RCC-KI, Russia TCD, Trinity College, Dublin, Ireland Current Status of GSVG issue handling (30 th April 2007) Since the activity started a total 102 potential issues have been submitted, 53 are open, and 49 have been closed. S/W bugs are closed when a patch is issued, Operational issues are closed as soon as the OSCT has been informed. Many of the open S/W bugs have been fixed but are awaiting the next software release.