Security Update WLCG GDB CERN, 12 June 2013 David Kelsey STFC/RAL.

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks MyProxy and EGEE Ludek Matyska and Daniel.
Advertisements

Grid Security Policy GridPP18, Glasgow David Kelsey 21sr March 2007.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI - Identity Management Steven Newhouse Director, EGI.eu Federated Identity.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 05/15/2013.
INFSO-RI Enabling Grids for E-sciencE Update on LCG/EGEE Security Policy and Procedures David Kelsey, CCLRC/RAL, UK
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Security Policy Group Summary EGI TF David Kelsey 6/28/
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
Security Incident Response Trust Framework for Federated Identity (Sir-T-Fi) David Kelsey (STFC-RAL) REFEDS, Indianapolis 26 Oct 2014 and now abbreviated.
Trust and Security for FIM (Sirtfi/SCI) David Kelsey (STFC-RAL) FIM4R at CERN 4 Feb 2015.
OSG Area Coordinators Meeting Security Team Report Kevin Hill 08/14/2013.
IOTA Questions for RPs Sept 9, 2013 Bucharest, Romania.
LiveAP Towards Differentiated Identity Assurance David Groep, Nikhef supported by the Netherlands e-Infrastructure SURFsara, and EGI.eu O-E-15 and EGI-InSPIRE.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
Federated Identity Management for HEP David Kelsey WLCG GDB 9 May 2012.
Updates from the EUGridPMA David Groep, July 16 st, 2007.
Identity Management in Open Science Grid Identity Management in Open Science Grid Challenges, Needs, and Future Directions Mine Altunay OSG Security Officer.
WLCG Security: A Trust Framework for Security Collaboration among Infrastructures David Kelsey (STFC-RAL, UK) CHEP2013, Amsterdam 17 Oct 2013.
EUGridPMA Status, current trends and some technical topics March 2013 Boulder, CO, USA David Groep, Nikhef & EUGridPMA.
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
Security Policy Update LCG GDB Prague, 4 Apr 2007 David Kelsey CCLRC/RAL
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
9-Sep-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security (Report from the LCG Security Group) CERN, 9 September 2003 David Kelsey CCLRC/RAL, UK
RI EGI-InSPIRE RI EGI Future activities Peter Solagna – EGI.eu.
EResearchers Requirements the IGTF model of interoperable global trust and with a view towards FIM4R AAI Workshop Presenter: David Groep, Nikhef.
IOTA Questions for RPs Sept 9, 2013 Bucharest, Romania.
SHA-2, current trends and some technical topics March 2013 Taipei, TW David Groep, Nikhef & EUGridPMA.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud Security - what is needed Linda Cornwall (STFC) and the.
EUGridPMA Status, current trends and some technical topics March 2013 Taipei, TW David Groep, Nikhef & EUGridPMA.
9-Oct-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security (Report from the LCG Security Group) FNAL 9 October 2003 David Kelsey CCLRC/RAL, UK
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
Security Policy Update David Kelsey UK HEP Sysman, RAL 1 Jul 2011.
A Trust Framework for Security Collaboration among Infrastructures David Kelsey (STFC-RAL, UK) 1 st WISE, Barcelona 20 Oct 2015.
IOTA AP Towards Differentiated Identity Assurance David Groep, Nikhef supported by the Netherlands e-Infrastructure and SURFsara.
A Trust Framework for Security Collaboration among Infrastructures David Kelsey (STFC-RAL, UK) WLCG GDB, CERN 10 Jul 2013.
Security Policy: From EGEE to EGI David Kelsey (STFC-RAL) 21 Sep 2009 EGEE’09, Barcelona david.kelsey at stfc.ac.uk.
Security Policy Update WLCG GDB CERN, 14 May 2008 David Kelsey STFC/RAL
Additional Services: Security and IPv6 David Kelsey STFC-RAL.
EGI-InSPIRE RI EGI EGI-InSPIRE RI Service Operations Security Policy the new generalised site operations security policy.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI SPG future work EGI Technical Forum Lyon, 21 Sep 2011 David Kelsey, STFC/RAL.
EGI-InSPIRE RI EGI EGI-InSPIRE RI Establishing Identity in EGI the authentication trust fabric of the IGTF and EUGridPMA.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
JSPG Update David Kelsey MWSG, Zurich 31 Mar 2009.
Security Policy Update WLCG GDB CERN, 8 Dec 2010 David Kelsey STFC/RAL david.kelsey AT stfc.ac.uk.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI IGTF EUGridPMA status update SHA-2, OCSP, and more David.
LCG Pilot Jobs + glexec John Gordon, STFC-RAL GDB 7 December 2007.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI CSIRT Procedure for Compromised Certificates and Central Security Emergency.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI VOMS Proxy Lifetime UCB 21 Aug 2012 David Kelsey STFC.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Questionnaires to Cloud technology providers and sites Linda Cornwall, STFC,
Grid Security Policy: EGEE to EGI David Kelsey (RAL) 16 Sep 2009 JSPG meeting, DFN Berlin david.kelsey at stfc.ac.uk.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI IGTF & EUGridPMA status update SHA-2 – and more (David Groep,
News from EUGridPMA EGI OMB, 22 Jan 2013 David Kelsey (STFC) Using notes from David Groep 22/01/20131EUGridPMA News.
PRACE security Jules Wolfrat, SURFsara, The Netherlands April 25, 2013, EGI CSIRT meeting, Linköping, Sweden 10 May Montpellier.
Authentication and Authorisation for Research and Collaboration David Kelsey AARC AHM Utrecht NA3 Task 4 – Scalable Policy Negotiation.
15-Jun-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the LCG Security Group) CERN 15 June 2004 David Kelsey CCLRC/RAL, UK
Cloud Security Session: Introduction 25 Sep 2014Cloud Security, Kelsey1 David Kelsey (STFC-RAL) EGI-Geant Symposium Amsterdam 25 Sep 2014.
Security Policy Update WLCG GDB CERN, 11 June 2008 David Kelsey STFC/RAL
IGTF in 10 years enabling the interoperable global trust federation Nikhef, Amsterdam supported the Dutch national e-Infrastructure funded and coordinated.
SCI & Sirtfi David Kelsey (STFC-RAL) EGI Conference, Lisbon 19 May 2015.
Security Incident Response Trust Framework for Federated Identity (Sir-T-Fi) David Kelsey (STFC-RAL) REFEDS, Indianapolis 26 Oct 2014.
David Kelsey STFC-RAL 4th WISE workshop, Nikhef 27 March 2017
LCG Security Status and Issues
David Kelsey STFC-RAL 2nd WISE workshop, XSEDE16, Miami 18 July 2016
EGI Security Policy Update
Assessing Combined Assurance
SHA-2 Migration status David Groep Nikhef Nikhef, Amsterdam
Update - Security Policies
and the SHA-1 depreciation time line and status
David Kelsey (STFC-RAL)
Presentation transcript:

Security Update WLCG GDB CERN, 12 June 2013 David Kelsey STFC/RAL

Overview A VERY long time since I gave a Security Update –Much to talk about (this will be rushed!) IGTF news –SHA2 etc Revised Security Policies –Service Operations –AUP Security for Collaborating Infrastructures (SCI) Security operations 12 Jun 20132Security - D Kelsey

IGTF news I attend EUGridPMA and TAGPMA meetings –Representing WLCG as a “Relying Party” Many recent developments –But today just report on some! TAGPMA meeting 6-7 May 2013 EUGridPMA meeting May 2013 Thanks to David Groep for the following slides –Shown to the EGI OMB Summary of EUGridPMA meeting at: Jun 2013Security - D Kelsey3

EGI-InSPIRE RI SHA-2 time line agreed Now –CA certificates in the IGTF distribution and CRLs at official distribution points should use SHA-1 –CAs should issue SHA-1 end entity certificates by default –CAs may issue SHA-2 (SHA-256 or SHA-512) end entity certificates on request. CAs may publish SHA-2 (SHA-256 or SHA-512) CRLs at alternate distribution point URLs 1 st October 2013 –CAs should begin to phase out issuance of SHA-1 end entity certificates –CAs should issue SHA-2 (SHA-256 or SHA-512) end entity certificates by default 1 st April 2014 –New CA certificates should use SHA-2 (SHA-512) –Existing intermediate CA certificates should be re-issued using SHA-2 (SHA-512) –Existing root CA certificates may continue to use SHA-1 1 st October 2014 –CAs may begin to publish SHA-2 (SHA-256 or SHA-512) CRLs at their official distribution points. 1 st December 2014 (‘sunset date’) –All issued SHA-1 end entity certificates should be expired or revoked. In case of new SHA-1 vulnerabilities, the above schedule may be revised IGTF Summary OMB May 2013

EGI-InSPIRE RI SHA-2 readiness For SHA-2 there are still a few CAs not ready a few can do either SHA-2 OR SHA-1 but not both –so they need to wait for software to be SHA-2-ready and then change everything at once A select few can do SHA-2 but their time line is not driven solely by us (i.e. some commercials) –Their time line is driven by the largest customer base –All can do SHA-2 already – some do on request (since non-grid customers do request SHA-2-only PKIs) –it is because of these that RPs have to be ready, because when directives come from CABF they will change, and do it quite irrespective of our time table! Keep in mind issues for HSMs (robot tokens) IGTF Summary OMB May 2013

EGI-InSPIRE RI Other work items IPv6 deployment –expect RPs with v6-only systems to setup 6-to-4 NAT/proxy IGTF ‘Test Suite’ for software providers Guidelines on operation trusted credential stores (draft) –matches with the Private Key Protection guidelines –guidance for MyProxy setups, portals, credential mngt systems –intended to be ‘good advice’ for RPs – things to consider Progress on move towards differentiated ID assurance –provides only unique opaque identifier: no identity, no tracability –needs tuning of LoA with our RPs, current version may be too much XSEDE and does not even work yet for PRACE-T1s… IGTF Summary OMB May 2013

IGTF IOTA profile Input TAGPMA, CI Logon Basic, and UK SARoNGS RP requirements from XSEDE and PRACE New authentication profile –Identifier-Only Trust Assurance –Persistent unique identifiers –Light-weight identity vetting Appropriate in cases where VO does robust ID vetting, e.g. LHC VOs 12 Jun 2013Security - D Kelsey7

IOTA (2) If a commonName is included –it must contain either an opaque unique identifier –or a name chosen by the requestor and obtained from (a list proposed by) the IdP on which the issuer will enforce uniqueness Full details at 12 Jun 2013Security - D Kelsey8

Revised Security Policies EGI Security Policy Group Old Grid Site Operations Security Policy –Replaced by Service Operations Security Policy As it is not just sites who run services –And a recent new bullet on the policy requirement for deployment of Security Emergency Suspension You must implement automated procedures to download the security emergency suspension lists defined centrally by Security Operations and should take appropriate actions based on these lists, to be effective within the specified time period. 12 Jun 2013Security - D Kelsey9

Service Operations Security Policy (2) Other changes: –addresses end of security support for software … software patches, updates or configuration changes required for security or end of security support … –removes the IPR statement (covered elsewhere) –addresses the retirement of a service Upon retirement of a service, the obligations specified in clauses 1, 2, 5 and 6 shall not lapse for the retention period specified in the Traceability and Logging Policy Has been adopted by EGI from 1 st June 2013 I propose that WLCG adopts this revised policy –At an upcoming WLCG MB meeting 12 Jun 2013Security - D Kelsey10

Revision to Grid AUP EGI Council decided to require its users to acknowledge support and resources used –And requested change to the User AUP EGI SPG considered –Not easy as Users usually register with VOs not sites or infrastructures This is one document where common wording between all VOs, communities etc is very useful! The following new wording has been added –Next page 12 Jun 2013Security - D Kelsey11

New AUP(2) Acknowledgement of support or of your use of the resources or services provided to you by Infrastructure Providers, Infrastructure Organisations and/or Resource Centres may be required by the body or bodies granting you access. You shall comply with all such requirements by adding the specified citations or acknowledgements to all published papers, preprints, conference papers and talks and any other published material, whether or not these are subject to copyright. Additional procedures are required to specify what acknowledgements are required and by whom 12 Jun 2013Security - D Kelsey12

Security for Collaborating Infrastructures A collaborative activity of information security officers from large-scale infrastructures –EGI, OSG, PRACE, EUDAT, CHAIN, WLCG, XSEDE, … Developed out of EGEE and WLCG We are developing a Trust framework –Enable interoperation (security teams) –Manage cross-infrastructure security risks –Develop policy standards –Especially where not able to share identical security policies 12 Jun 2013Security - D Kelsey13

SCI (2) A draft version (V0.95) may be found at The document defines a series of numbered requirements in 6 areas –Each infrastructure should address these –Part of promoting trust between us all Version 1 has been produced –And is being tidied No time to look at details today But this is a useful way of building trust within WLCG –And for identifying areas that need more work Once V1 is finalised we will share with GDB and MB 12 Jun 2013Security - D Kelsey14

Security Operations You are all very aware that WLCG uses resources from several computing infrastructures: –EGI, OSG, NDGF/NeIC, … Today security operations in WLCG relies on strong collaboration between –Romain Wartel as WLCG Security Officer –CERN security team –The CSIRTs from EGI and NGIs, OSG, NDGF/NeIC In recent weeks there has been much activity by the EGI CSIRT monitoring and handling the vulnerability CVE –Several people have been very busy for some weeks! EGI CSIRT is now accredited by TF-CSIRT/Trusted Introducer 12 Jun 2013Security - D Kelsey15

Security Operations after end of EGI-InSPIRE? The study made by EGI as to which global tasks need to continue beyond May 2014 identified “Security”, including a strengthened core expert incident response team as of “critical” importance As we move into an ever-changing world –Agile computing, Clouds, Virtualisation etc –Security risks and threats will change –Competent security teams will be needed! We confidently expect EGI.eu sustainable funding for this important activity to continue –And we may be able to bid for additional funds E.g. Horizon 2020 I don’t currently see any plan B for WLCG and its members to take over the funding of this 12 Jun 2013Security - D Kelsey16

Discussion? 12 Jun 2013Security - D Kelsey17