EGEE-II INFSO-RI-031688 Enabling Grids for E-sciencE www.eu-egee.org EGEE and gLite are registered trademarks Grid Security Vulnerabilities Dr Linda Cornwall,

Slides:



Advertisements
Similar presentations
OWASP CLASP Overview.
Advertisements

No 1 IT Governance – how to get the right and secured IT services Bjorn Undall and Bengt E W Andersson The Swedish National Audit Office Oman
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks MyProxy and EGEE Ludek Matyska and Daniel.
GT4 Architectural Security Review December 17th, 2004.
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
1 Understanding Web Project Management Build a better relationship with IT Christina Zeller InfoAction, Vancouver Public Library SLA NorthWest Regional.
Objectives To introduce software project management and to describe its distinctive characteristics To discuss project planning and the planning process.
Grid Security Policy GridPP18, Glasgow David Kelsey 21sr March 2007.
INFSO-RI Enabling Grids for E-sciencE Information and Monitoring Status and Plans GridPP16, QMUL, 29 Jun 2006 Steve.
WS-JDML: A Web Service Interface for Job Submission and Monitoring Stephen M C Gough William Lee London e-Science Centre Department of Computing, Imperial.
Building Relationships
Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?
1 Dr. Ashraf El-Farghly SECC. 2 Level 3 focus on the organization - Best practices are gathered across the organization. - Processes are tailored depending.
S-Curves & the Zero Bug Bounce:
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security - the Grid View The Good, the Bad.
Security metrics in SCADA system Master of Computer and Information Science Student: Nguyen Duc Nam Supervisor: Elena Sitnikova.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 5 Slide 1 Project management.
Addition 1’s to 20.
Week 1.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 2.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI The EGI Software Vulnerability Group and EMI Dr Linda Cornwall, STFC, Rutherford.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGI-InSPIRE The EGI Software Vulnerability Group (SVG) What is a Software Vulnerability?SVG membership and interaction with other groups Most people are.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
The Grid Services Security Vulnerability and Risk Assessment Activity in EGEE-II Enabling Grids for E-sciencE EGEE-II INFSO-RI
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Handling Grid Security Vulnerabilities in.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
GGF12 – 20 Sept LCG Incident Response Ian Neilson LCG Security Officer Grid Deployment Group CERN.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks The Grid Security Vulnerability Group Dr.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Security Vulnerability Handling and.
1 Chapter 5 Project management. 2 Project management : Is Organizing, planning and scheduling software projects.
Deployment Issues David Kelsey GridPP13, Durham 5 Jul 2005
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud F2F Security Issues in the cloud Introduction Linda Cornwall,
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSVG issues handling Dr Linda Cornwall CCLRC.
GridPP Deployment & Operations GridPP has built a Computing Grid of more than 5,000 CPUs, with equipment based at many of the particle physics centres.
Update on the Grid Security Vulnerability Group Linda Cornwall, MWSG7, Amsterdam 14 th December 2005
Security Vulnerabilities Linda Cornwall, GridPP15, RAL, 11 th January 2006
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud Security - what is needed Linda Cornwall (STFC) and the.
Grid Security Vulnerability Group Linda Cornwall, GDB, CERN 7 th September 2005
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
The Grid Security Vulnerability Group (GSVG) Enabling Grids for E-sciencE EGEE-III INFSO-RI Eliminating and Preventing.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Security Threat Risk Assessment Dr Linda Cornwall Rutherford Appleton.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Vulnerability handling, Risk management,
Security Vulnerability Identification and Reduction Linda Cornwal, JRA1, Brno 20 th June 2005
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Services Security Vulnerability and.
Computer Security Status C5 Meeting, 2 Nov 2001 Denise Heagerty, CERN Computer Security Officer.
Additional Services: Security and IPv6 David Kelsey STFC-RAL.
Security Vulnerability Detection and reduction Linda Cornwall MWSG, CERN 24 Feb 2005
Planning for LCG Emergencies HEPiX, Fall 2005 SLAC, 13 October 2005 David Kelsey CCLRC/RAL, UK
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks MSA3.4.1 “The process document” Oliver Keeble.
Recent lessons learned: Operational Security David Kelsey CCLRC/RAL, UK GDB Meeting, BNL, 5 Sep 2006.
INFSO-RI Enabling Grids for E-sciencE Joint Security Policy Group David Kelsey, CCLRC/RAL, UK 3 rd EGEE Project.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks EGEE Operations: Evolution of the Role of.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI CSIRT Procedure for Compromised Certificates and Central Security Emergency.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud and Software Vulnerabilities Linda Cornwall, STFC 20.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Questionnaires to Cloud technology providers and sites Linda Cornwall, STFC,
Grid Deployment Technical Working Groups: Middleware selection AAA,security Resource scheduling Operations User Support GDB Grid Deployment Resource planning,
15-Jun-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the LCG Security Group) CERN 15 June 2004 David Kelsey CCLRC/RAL, UK
EGEE-II Enabling Grids for E-sciencE EGEE and gLite are registered trademarks The Grid Security Vulnerability Group Activity in Central.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI D4.4 and the EGI review Dr Linda Cornwall 19 th Sept 2011 D4.41.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSVG issue handling summary Dr Linda Cornwall.
Vulnerability Handling – experience from the October Torque issue
Grid Services Security Vulnerability and Risk Analysis
EGI Security Risk Assessment
Software Vulnerability Group Status update
Cybersecurity Am I concerned?
Prevention is better than Cure
Presentation transcript:

EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Security Vulnerabilities Dr Linda Cornwall, Rutherford Appleton Laboratory GridPP16 meeting, 27-29th June 2006

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability- GridPP16 - Linda Cornwall 2 Reminder: Why we set up the Grid Security Vulnerability Group (GSVG) A lot done concerning Grid Security Functionality –Authentication, Authorization Not much being done to ask Is the Grid Secure We know the software isnt perfect – Some vulnerabilities are in the process of being fixed – Some are probably waiting to be exploited It will be really embarrassing if when the Large Hadron Collider comes on line at CERN we get a serious attack which prevents data being stored or processed Hackers Conference HOPE mentioned Grids –Unfriendly people without credentials aware of us –Cannot rely on security through obscurity Real Grids are being deployed –No longer a research/proof of concept activity

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability- GridPP16 - Linda Cornwall 3 The Vulnerability Task in EGEE II In EGEE II there is manpower for the Grid Services Security Vulnerability and Risk Assessment Task The aim is to incrementally make the Grid more secure and thus provide better availability and sustainability of the deployed infrastructure –This is recognition that it cannot be made perfect immediately Handling of Vulnerability issues is the largest activity in this task –Which continues to deal with specific issues –Continues not to be confined to software vulnerabilities, but also includes issues arising from lack of functionality and deployment problems

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability- GridPP16 - Linda Cornwall 4 Setup of the GSVG in EGEE II The GSVG in EGEE II consists of Core Group Members –Run the general process Developers from the various development Clusters –Can confirm/check information on issues and fix issues Risk Assessment Team (RAT) –Carry out Risk Assessments RAT people are security experts, experienced system administrators, deployment experts and developers

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability- GridPP16 - Linda Cornwall 5 Process of the GSVG in EGEE II Issue logged in Database –Anyone can submit an issue –Only GSVG members can read or modify –Issues can also be submitted by Issue is allocated to Risk Assessment Team (RAT) member RAT member –Checks information – need to work with appropriate developer –Carries out a Risk assessment 2 other RAT members also carry out Risk Assessment Target Date (TD) set according to Risk –To improve prioritizing The issue is then allocated to the appropriate developer

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability- GridPP16 - Linda Cornwall 6 Disclosure Policy for EGEE II We plan to move to a responsible public disclosure policy On Target Date, information on the issue is made public –Regardless of whether a fix is available This depends on management approval, –We need to prove we can do good Risk Assessments –Agree formula for setting the TD according to Risk

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability- GridPP16 - Linda Cornwall 7 Main changes A risk assessment is carried out straight after issue is entered Improved Risk Assessments Target Date is set according to Risk – By formula to be agreed Information to be made public on the Target Date Good Risk Assessments and setting of TD according to risk is key to making the improved process work –Which effectively prioritizes issues

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability- GridPP16 - Linda Cornwall 8 Risk Assessments Tendency for physicists to underestimate risk –Why on earth would anyone want to spoil our nice collaboration, or do anything illegal? Tendency for developers to also underestimate risk –Their Managers focus on new functionality Tendency for some site admins to be very cautious Need an agreed strategy where risk assessments are objective not subjective

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability- GridPP16 - Linda Cornwall 9 Exploit/effect matrix Site security officers most fear an attack that gives access to the whole site –Especially if it can be carried out anonymously –DOS tends to be considered no more than medium risk A vulnerability that can be exploited by an authorized user is considered by most less serious than one that can be exploited without credentials We cant ignore the possibility that credentials may be stolen Nor can we ignore that we may have a rogue sysadmin –100s sites in 10s countries –Grid expanding globally This is considered useful

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability- GridPP16 - Linda Cornwall 10 Matrix Root Access Local Account AuthzAuthnNo CredOther System info Local grid service Disruption Confidential DataRestricts usage for certain applications Unauthz usage Grid-wide Disrupt Impersonate Attack other systems Site Access Root Access

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability- GridPP16 - Linda Cornwall 11 Categories Propose 4 categories of risk Extremely Critical High Moderate Low

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability- GridPP16 - Linda Cornwall 12 Extremely Critical Examples Trivial compromise of core grid component Remotely exploitable issue that can lead to system compromise Root access with no Credentials Trivial Grid Wide DoS with no Credentials Special process for handling –Alert OSCT + EMT immediately –Quick patch – in isolation with no other release, tested at the front of the queue –Unrelated to release process Expectation – Very rare if ever Suggested TD 48 hours

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability- GridPP16 - Linda Cornwall 13 High Risk Examples Remote exploit against middleware service Spoofing – carrying an action on someones behalf Exploit against MW component that gives elevated access Grid-wide DoS? Information leakage which is illegal or embarrassing? Suggested Target Date 3 weeks

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability- GridPP16 - Linda Cornwall 14 Moderate Examples Confidential issues in user information Local DoS Potentially serious, but hard to exploit problem. –E.g. hard to exploit buffer overflow Race conditions that are hard to exploit Suggested Target Date 3 months

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability- GridPP16 - Linda Cornwall 15 Low Examples Small system information leak Impact on service minimal Note – if 2 low risk issues could produce problem, this should be entered as a higher risk issue Suggested Target Date – 6 months

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability- GridPP16 - Linda Cornwall 16 Notes The Risk classification could change –Rise if information is available publicly or issue has been exploited –Fall if more information comes to light, e.g. part of the code not aware of mitigates problem Formula for setting TD is not for the RAT to decide unilaterally –We can propose

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability- GridPP16 - Linda Cornwall 17 Advisories Advisory on issue is written when the risk assessment is carried out –By the RAT member the issue is allocated to, consulting other RAT members (if necessary) and appropriate developers Advisories available publicly on Target Date (or earlier if fix is available) Advisories will always include what to do –Solution –Patch/work around – which may reduce the service functionality –In worst case – advice to stop a service Advisories will be included in release notes Advisories will not describe how to exploit issue

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability- GridPP16 - Linda Cornwall 18 Encouraging updating Some sites do not update when new software is available If the advisories say that there is a vulnerability issue we hope this will encourage updating of software –Especially if this will be made public It may be necessary to suspend sites who refuse to update If move to a system where different components are released at different times – may need to have components returning their version? –Need to monitor which version of which component is installed –In a way that does not allow sites to lie!

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability- GridPP16 - Linda Cornwall 19 Questions/Discussion ???