20-May-03D.P.Kelsey, LCG-1 Security, HEPiX1 Grid Security for LCG-1 HEPiX, NIKHEF, 20 May 2003 David Kelsey CCLRC/RAL, UK

Slides:



Advertisements
Similar presentations
Grid Security Policy GridPP18, Glasgow David Kelsey 21sr March 2007.
Advertisements

Resources for the ATLAS Offline Computing Basis for the Estimates ATLAS Distributed Computing Model Cost Estimates Present Status Sharing of Resources.
INFSO-RI Enabling Grids for E-sciencE Update on LCG/EGEE Security Policy and Procedures David Kelsey, CCLRC/RAL, UK
5-Sep-02D.P.Kelsey, Security Summary, Budapest1 WP6/7 Security Summary Budapest 5 Sep 2002 David Kelsey CLRC/RAL, UK
Denise Heagerty, CERN, HEPiX Meeting Oct HEPiX Security Workshop Overview of talks Some extracts of general interest LCG Security Group FNAL, KEK,
30-Jan-03D.P.Kelsey, GridPP Security1 Security GridPP6 30 Jan 2003 Coseners House David Kelsey CLRC/RAL, UK
Authentication Policy David Kelsey CCLRC/RAL 15 April 2004, Dublin
A Model for Grid User Management Rich Baker Dantong Yu Tomasz Wlodek Brookhaven National Lab.
1 Developing Countries Access to Scientific Knowledge Ian Willers CERN, Switzerland.
LCG Milestones for Deployment, Fabric, & Grid Technology Ian Bird LCG Deployment Area Manager PEB 3-Dec-2002.
RomeWorkshop on eInfrastructures 9 December LCG Progress on Policies & Coming Challenges Ian Bird IT Division, CERN LCG and EGEE Rome 9 December.
13-May-03D.P.Kelsey, WP8 CA and VO organistion1 CA’s and Experiment (VO) Organisation WP8 Meeting EDG Barcelona, 13 May 2003 David Kelsey CCLRC/RAL, UK.
12-May-03D.P.Kelsey, SCG Online Authentication1 Online Authentication SCG Meeting EDG Barcelona, 12 May 2003 David Kelsey CCLRC/RAL, UK
INFSO-RI Enabling Grids for E-sciencE SA1: Cookbook (DSA1.7) Ian Bird CERN 18 January 2006.
LCG and HEPiX Ian Bird LCG Project - CERN HEPiX - FNAL 25-Oct-2002.
GGF12 – 20 Sept LCG Incident Response Ian Neilson LCG Security Officer Grid Deployment Group CERN.
CERN Deploying the LHC Computing Grid The LCG Project Ian Bird IT Division, CERN CHEP March 2003.
JSPG: User-level Accounting Data Policy David Kelsey, CCLRC/RAL, UK LCG GDB Meeting, Rome, 5 April 2006.
The LHC Computing Grid – February 2008 The Worldwide LHC Computing Grid Dr Ian Bird LCG Project Leader 25 th April 2012.
INFSO-RI Enabling Grids for E-sciencE EGEE/LCG Joint Security Policy Group David Kelsey, CCLRC/RAL, UK EGEE.
10-Jun-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security (Report from the LCG Security Group) CERN, 10 June 2003 David Kelsey CCLRC/RAL, UK
Security Policy Update LCG GDB Prague, 4 Apr 2007 David Kelsey CCLRC/RAL
13-Jul-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the Joint LCG/EGEE Security Group) CERN 13 July 2004 David Kelsey CCLRC/RAL,
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
9-Sep-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security (Report from the LCG Security Group) CERN, 9 September 2003 David Kelsey CCLRC/RAL, UK
23-Oct-03D.P.Kelsey, LCG Security Update, HEPiX1 LCG Security Update HEPiX-HEPNT, TRIUMF, 23 October 2003 David Kelsey CCLRC/RAL, UK
8-Jul-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security (Report from the LCG Security Group) RAL, 8 July 2003 David Kelsey CCLRC/RAL, UK
CERN LCG Deployment Overview Ian Bird CERN IT/GD LHCC Comprehensive Review November 2003.
3-Jul-02D.P.Kelsey, Security1 Security meetings Report to EDG PTB 3 Jul 2002 David Kelsey CLRC/RAL, UK
Security Mechanisms The European DataGrid Project Team
The LHC Computing Grid – February 2008 The Challenges of LHC Computing Dr Ian Bird LCG Project Leader 6 th October 2009 Telecom 2009 Youth Forum.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Linda Cornwall CCLRC (RAL) FP6 Security workshop.
15-Dec-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the Joint Security Policy Group) CERN 15 December 2004 David Kelsey CCLRC/RAL,
9-Oct-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security (Report from the LCG Security Group) FNAL 9 October 2003 David Kelsey CCLRC/RAL, UK
23-Oct-02D.P.Kelsey, Grid Security, HEPiX, FNAL1 LCG/EDG Security - update and plans HEPiX/HEPNT - FNAL 23 Oct 2002 David Kelsey CLRC/RAL, UK
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Dr Linda Cornwall CCLRC (RAL) FP6 Security workshop.
2-Sep-02D.P.Kelsey, WP6 CA, Budapest1 WP6 CA report Budapest 2 Sep 2002 David Kelsey CLRC/RAL, UK
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
Security Policy: From EGEE to EGI David Kelsey (STFC-RAL) 21 Sep 2009 EGEE’09, Barcelona david.kelsey at stfc.ac.uk.
Security Policy Update WLCG GDB CERN, 14 May 2008 David Kelsey STFC/RAL
11-Dec-00D.P.Kelsey, Certificates, WP6 meeting, Milan1 Certificates for DataGrid Testbed0 David Kelsey CLRC/RAL, UK
CERN LCG Deployment Overview Ian Bird CERN IT/GD LCG Internal Review November 2003.
16-Nov-01D.P.Kelsey, HTASC report1 HTASC - Report to HEP-CCC David Kelsey, RAL rl.ac.uk 16 November 2001, CERN ( )
EGEE is a project funded by the European Union under contract IST Roles & Responsibilities Ian Bird SA1 Manager Cork Meeting, April 2004.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks EGEE and JSPG activities David Kelsey CCLRC/RAL.
8-Mar-01D.P.Kelsey, Certificates, WP6, Amsterdam1 WP6: Certificates for DataGrid Testbeds David Kelsey CLRC/RAL, UK
12-Jun-03D.P.Kelsey, CA meeting1 CA meeting Minimum Requirements CERN, 12 June 2003 David Kelsey CCLRC/RAL, UK
LHC Computing, SPC-FC-CC-C; H F Hoffmann1 CERN/2379/Rev: Proposal for building the LHC computing environment at CERN (Phase 1) Goals of Phase.
18-May-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the LCG Security Group) Barcelona 18 May 2004 David Kelsey CCLRC/RAL, UK
The GRIDS Center, part of the NSF Middleware Initiative Grid Security Overview presented by Von Welch National Center for Supercomputing.
15-May-03D.P.Kelsey, SCG Summary1 Security Coord Group (SCG) EDG Barcelona, 12 May 2003 David Kelsey CCLRC/RAL, UK
INFSO-RI Enabling Grids for E-sciencE Joint Security Policy Group David Kelsey, CCLRC/RAL, UK 3 rd EGEE Project.
10-May-01D.P.Kelsey, WP6 Security1 Certificates/Authorisation for DataGrid Testbeds David Kelsey CLRC/RAL, UK
7-May-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Issues and Planning or Report from the Security Group CERN, 8 May 2003 David Kelsey CCLRC/RAL, UK.
11-May-01D.P.Kelsey, Security Update1 GRID Security Update David Kelsey CLRC/RAL, UK
Grid Deployment Technical Working Groups: Middleware selection AAA,security Resource scheduling Operations User Support GDB Grid Deployment Resource planning,
Top 5 Experiment Issues ExperimentALICEATLASCMSLHCb Issue #1xrootd- CASTOR2 functionality & performance Data Access from T1 MSS Issue.
15-Jun-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the LCG Security Group) CERN 15 June 2004 David Kelsey CCLRC/RAL, UK
WLCG Tier-2 Asia Workshop TIFR, Mumbai 1-3 December 2006
Status of Task Forces Ian Bird GDB 8 May 2003.
David Kelsey CCLRC/RAL, UK
JRA3 Introduction Åke Edlund EGEE Security Head
LCG Security Status and Issues
David Kelsey CCLRC/RAL, UK
Ian Bird GDB Meeting CERN 9 September 2003
David Kelsey CCLRC/RAL, UK
LCG Operations Centres
Ian Bird LCG Project - CERN HEPiX - FNAL 25-Oct-2002
LHC Data Analysis using a worldwide computing grid
Presentation transcript:

20-May-03D.P.Kelsey, LCG-1 Security, HEPiX1 Grid Security for LCG-1 HEPiX, NIKHEF, 20 May 2003 David Kelsey CCLRC/RAL, UK

20-May-03D.P.Kelsey, LCG-1 Security, HEPiX2 Overview LHC Computing Grid project (LCG) –Introduction: slides from Ian Bird (CERN) LCG Security Group Security technology Policies, procedures and other issues

CERN LCG - Goals The goal of the LCG project is to prototype and deploy the computing environment for the LHC experiments Two phases: –Phase 1: 2002 – 2005 –Build a service prototype, based on existing grid middleware –Gain experience in running a production grid service –Produce the TDR for the final system –Phase 2: 2006 – 2008 –Build and commission the initial LHC computing environment F LCG is not a development project – it relies on other grid projects for grid middleware development and support

CERN LCG - Milestones The agreed Level 1 project milestones for Phase 1 are:The agreed Level 1 project milestones for Phase 1 are: –deployment milestones are in red M1.1 - July 03First Global Grid Service (LCG-1) available M1.2 - June 03Hybrid Event Store (Persistency Framework) available for general users M1.3a - November 03LCG-1 reliability and performance targets achieved M1.3b - November 03Distributed batch production using grid services M1.4 - May 04Distributed end-user interactive analysis from “Tier 3” centre M1.5 - December 04“50% prototype” (LCG-3) available M1.6 - March 05Full Persistency Framework M1.7 - June 05LHC Global Grid TDR

CERN LCG Regional Centres Tier 0 CERN Tier 1 Centres Brookhaven National Lab CNAF Bologna Fermilab FZK Karlsruhe IN2P3 Lyon Rutherford Appleton Lab (UK) University of Tokyo CERN Other Centres Academica Sinica (Taipei) Barcelona Caltech GSI Darmstadt Italian Tier 2s(Torino, Milano, Legnaro) Manno (Switzerland) Moscow State University NIKHEF Amsterdam Ohio Supercomputing Centre Sweden (NorduGrid) Tata Institute (India) Triumf (Canada) UCSD UK Tier 2s University of Florida– Gainesville University of Prague …… Confirmed Resources: Centres taking part in the LCG prototype service : 2003 – 2005

CERN LCG Resource Commitments – 1Q04 CPU (kSI2K) Disk TB Support FTE Tape TB CERN Czech Republic France Germany Holland Italy Japan Poland Russia Taiwan Spain Sweden Switzerland UK USA Total

20-May-03D.P.Kelsey, LCG-1 Security, HEPiX7 LCG Security Group LCG Grid Deployment Board (GDB) –Regional centres and Experiments –Plan for deployment and operations GDB working groups – reported Feb 2003 –WG1 Middleware selection –WG2 Services and resource scheduling –WG3 Security –WG4 Operations –WG5 User Support WG3 reported that lots of work still to be done –LCG Security Group created – first meeting 9 April 03 Concentrating on the planning and implementation for start-up of LCG-1 (July 03) –But keep longer term in mind

20-May-03D.P.Kelsey, LCG-1 Security, HEPiX8 Mandate To advise and make recommendations to the Grid Deployment Manager and the GDB on all matters related to LCG-1 Security –GDB makes the decisions To continue work on the mandate of GDB WG3 –Policies and procedures on Registration, Authentication, Authorization and Security To produce and maintain –Implementation Plan (first 3 months, then for 12 months) –Acceptable Use Policy/Usage Guidelines –LCG-1 Security Policy Where necessary recommend the creation of focussed task- forces made-up of appropriate experts –the “Security Contacts” group already working Led by Dane Skow, FNAL

20-May-03D.P.Kelsey, LCG-1 Security, HEPiX9 Membership Experiment representatives/VO managers –Important to create the balance between functionality and security –Alberto Masoni, ALICE –Rich Baker, Anders Waananen, ATLAS –David Stickland, Greg Graham, CMS –Joel Closier, LHCb Site Security Officers –Denise Heagerty (CERN), Dane Skow (FNAL) Site/Resource Managers –Dave Kelsey (RAL) - Chair Security middleware experts/developers –Roberto Cecchini (INFN), Akos Frohner (CERN) LCG management and the CERN LCG team –Ian Bird, Ian Neilson, Markus Schulz Non-LHC experiments/Grids –Many sites also involved in other projects –Bob Cowles (SLAC) Still open to nominations of additional people

20-May-03D.P.Kelsey, LCG-1 Security, HEPiX10 Grid security technology For LCG-1 start-up –Use what exists today Based on EDG release 2.0 Authentication (X.509 PKI) –List of trusted national CA’s –Online authentication: FNAL KCA, MyProxy Authorization –VO (LDAP) databases –Mkgridmap tool to create Grid mapfiles –Map to local user account (real or pool) AuthZ components: VOMS, LCAS/LCMAPS, US CMS VOX –Under development –See David Groep’s talk at this HEPiX –To be used when available, tested and proved Registration and VO management tools – under development

20-May-03D.P.Kelsey, LCG-1 Security, HEPiX11 Policies and procedures All under consideration by GDB for approval in June Authentication - trusted CA’s Incident response Audit (and Accounting) User Rules/AUP/LCG Security Policy User Registration –Personal information –Procedures –Pre-registration and account creation VO Management Not discussed in detail (yet): –Firewalls (no big problems yet in LCG-0) –Outbound net connections from worker nodes?

20-May-03D.P.Kelsey, LCG-1 Security, HEPiX12 Authentication - Trust Two main issues –Who defines the list of trusted CA’s? LCG or other Grid projects (EDG)? –How to introduce new types of CA (online)? E.g. Kerberos CA at FNAL LCG-1 and EDG Application testbed –closely linked (at many sites) –Common approach desirable (for this year) For 2003: proposed that GDB approves the list –EDG list plus additions –Require sites to install trusted list For Jan 2004 onwards –Forum for CA best practice and trust is evolving EGEE, GGF Community larger than just HEP

20-May-03D.P.Kelsey, LCG-1 Security, HEPiX13 EDG CA’s 18 on the trusted list (today) Canada, CERN, Cyprus, Czech Republic, France, Germany, Greece, Ireland, Italy, Netherlands, Nordic, Poland, Portugal, Russia, Slovakia, Spain, UK, USA For EDG, CrossGrid, DataTAG, US projects… “Catch-all” operated today by CNRS/France Under development/consideration Belgium, FNAL (KCA), Hungary, Israel, Japan, Taiwan Next meeting of the CA group is 12/13 June (CERN)

20-May-03D.P.Kelsey, LCG-1 Security, HEPiX14 Incident Response Draft document (Dane Skow) –being discussed on Security Contacts list –Incidents, communications, enforcement, escalation etc –working draft by end of May We already have a (mail) list of Contacts –these are people While no Grid Operations Centres –We need/will create an ops security list –Default site entry is the Contact person but an operational list would be better for Site Security Ops use only (not for users) Response will be no better than current cover –Varies from site to site –But not 24*7

20-May-03D.P.Kelsey, LCG-1 Security, HEPiX15 Audit (and Accounting) LCG ops team defining lists of what logs need to be kept for audit purposes –Mainly grid services (CE etc) and batch services –Some grid service logs are distributed –Logs may also contain non-grid jobs (no problem) List to be finalised in June Format to be specified later (not July 2003) Tools to analyse and aggregate info will come later Propose minimum retention period is 3 months Some of the same logs will be needed for Accounting but this is not our responsibility

20-May-03D.P.Kelsey, LCG-1 Security, HEPiX16 Acceptable Use Policy A single common policy to be agreed to/used by all –A big challenge! –Refers to the AUP/Rules of all sites –Only for professional Grid use Users agree to this when they join the LCG-1 VO We start with the current EDG User Rules –Aim to make minimal changes This includes User Rules, responsibilities of the Sites and rules for access to personal data Eventually we aim to have separate User Rules and a LCG Security Policy (but not for July) The AUP to be submitted to the GDB (end of May)

20-May-03D.P.Kelsey, LCG-1 Security, HEPiX17 User Registration Personal Information The process for July 03 –User registers with the LCG-1 Reg. Web –This list of users (the LCG-1 Guidelines VO) starts from an empty list (no inherited users) –User requests membership of a VO –Registration will have an initial short expiry date Propose 6 months (2004 – new AUP/Policy, new procedures) –Information collected (fields on the web form) is ideally the super-set of that required by the sites But this almost certainly not possible Aims –Avoid user having to register at multiple sites –Avoid situation where users jobs will only run at subset of sites (but technically possible)

20-May-03D.P.Kelsey, LCG-1 Security, HEPiX18 User personal info (2) Current common list (discussed on Security Contacts list) –Full name, Institute, telephone number, address, Certificate DN, Experiment OK so far, but some sites have requirements for additional fields Some US sites, for example, require –Nationality, date of birth and place of birth –Info required up-front for pre-registration These items raise significant privacy concerns –Can be used for Identity theft –Users rightly concerned about the distribution/use of their data

20-May-03D.P.Kelsey, LCG-1 Security, HEPiX19 User personal info (3) GDB expressed strong concerns about the distribution of and access to the data (privacy and legal issues) –Very unlikely to divulge personal info held by them Even after an incident Reg. web will request the user’s consent to use the personal data We need LCG policy in this area –Who has access to the data and for what purpose? GDB sites considering the requirements –Can policy be changed? At least in the short-term (or look at exceptions) –Avoid pre-registration of the users wherever possible –Aim to minimise and standardise the info collected –But may have to cope with diversity in the future

20-May-03D.P.Kelsey, LCG-1 Security, HEPiX20 Registration procedures We need a robust process for checking –The right of the user to join LCG-1 –That (s)he issued the request to join To enable sites to open resources to the users –Without pre-registration Long-term aim –move the registration process to the Experiment Secretariats/User offices Short-term –checks at the first stage in the registration process joining the LCG-1 Guidelines VO This is where the user info is collected and stored –Working with experiments to improve the existing rudimentary checks done by many VO managers

20-May-03D.P.Kelsey, LCG-1 Security, HEPiX21 VO Management Strong message from the experiments –One VO service per experiment –shared between LCG and EDG July 2003 –Use existing VO databases and servers run by NIKHEF (for LHC in EDG) –With existing VO managers These check and approve the requests to join With new-improved robust process By Jan 2004 (or earlier?) –LCG will need to run its own servers

20-May-03D.P.Kelsey, LCG-1 Security, HEPiX22 Summary Security is one of the big challenges for LCG-1 We are working hard to agree policy and procedures for start-up in July 2003 –But also planning for next year and beyond Looking forward to the new AuthZ technology –Groups, roles, fine-grained access control, etc Questions, comments?