Www.egi.eu EGI-InSPIRE RI-261323 EGI-InSPIRE www.egi.eu EGI-InSPIRE RI-261323 EGI Federated Cloud F2F Security Issues in the cloud Introduction Linda Cornwall,

Slides:



Advertisements
Similar presentations
Science Gateway Security Recommendations Jim Basney Von Welch This material is based upon work supported by the.
Advertisements

EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI GGUS user authentication Tiziana Ferrari/EGI.eu Peter Solagna/EGI.eu
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Security Policy Group Summary EGI TF David Kelsey 6/28/
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI The EGI Software Vulnerability Group and EMI Dr Linda Cornwall, STFC, Rutherford.
Cloud Computing Cloud Security– an overview Keke Chen.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGI-InSPIRE The EGI Software Vulnerability Group (SVG) What is a Software Vulnerability?SVG membership and interaction with other groups Most people are.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
EGI-InSPIRE RI EGI-InSPIRE RI EGI-InSPIRE EGI services for the long tail of science Peter Solagna Senior Operations.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Future support of EGI services Tiziana Ferrari/EGI.eu Future support of EGI.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Pakiti.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Evolution of the Open Science Grid Authentication Model Kevin Hill Fermilab OSG Security Team.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
RI EGI-InSPIRE RI EGI Future activities Peter Solagna – EGI.eu.
Security Vulnerabilities Linda Cornwall, GridPP15, RAL, 11 th January 2006
UKI ROC/GridPP/EGEE Security Mingchao Ma Oxford 22 October 2008.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud Security - what is needed Linda Cornwall (STFC) and the.
Grid Security Vulnerability Group Linda Cornwall, GDB, CERN 7 th September 2005
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI (Present and) Future of the EGI Services for WLCG Peter Solagna – EGI.eu.
Trusted Virtual Machine Images a step towards Cloud Computing for HEP? Tony Cass on behalf of the HEPiX Virtualisation Working Group October 19 th 2010.
Security Policy Update David Kelsey UK HEP Sysman, RAL 1 Jul 2011.
Security Vulnerabilities in A Virtual Environment
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Security Threat Risk Assessment Dr Linda Cornwall Rutherford Appleton.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Security Vulnerability Identification and Reduction Linda Cornwal, JRA1, Brno 20 th June 2005
Reflections “from around the block.” (Security) Ian Neilson GridPP Security Officer STFC RAL.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Services Security Vulnerability and.
EGI-InSPIRE RI EGI EGI-InSPIRE RI Service Operations Security Policy the new generalised site operations security policy.
Evolving Security in WLCG Ian Collier, STFC Rutherford Appleton Laboratory Group info (if required) 1 st February 2016, WLCG Workshop Lisbon.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI SPG future work EGI Technical Forum Lyon, 21 Sep 2011 David Kelsey, STFC/RAL.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI VM Management Chair: Alexander Papaspyrou 2/25/
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
Lecture 15 Page 1 CS 236 Online Evaluating Running Systems Evaluating system security requires knowing what’s going on Many steps are necessary for a full.
Security Vulnerability Detection and reduction Linda Cornwall MWSG, CERN 24 Feb 2005
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Grid Oversight in Service Level Agreement environment Małgorzata Krakowian,
Why a Commercial Provider should Join the Academic Cloud Federation David Blundell Managing Director 100 Percent IT Ltd Simple, Flexible, Reliable.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Draft Security Virtualisation Policy (for Romain Wartel – CERN) EGI Technical.
Ian Collier, STFC, Romain Wartel, CERN Maintaining Traceability in an Evolving Distributed Computing Environment Introduction Security.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI CSIRT Procedure for Compromised Certificates and Central Security Emergency.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI VOMS Proxy Lifetime UCB 21 Aug 2012 David Kelsey STFC.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI UMD Roadmap Steven Newhouse 14/09/2010.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud and Software Vulnerabilities Linda Cornwall, STFC 20.
EGI-InSPIRE RI SPG Tasks for Year 2011 Jan 2011 Kelsey/Security Policy Group1.
EGI-InSPIRE RI SPG Tasks for Year 2011 Jan 2011 Kelsey/Security Policy Group1.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Enabling SSO capabilities in the EGI Cloud services Peter Solagna – EGI.eu.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Questionnaires to Cloud technology providers and sites Linda Cornwall, STFC,
Trusted Virtual Machine Images the HEPiX Point of View Tony Cass October 21 st 2011.
Logging and Monitoring. Motivation Attacks are common (see David's talk) – Sophisticated – hard to reveal, (still) quite limited in our environment –
INFSO-RI Enabling Grids for E-sciencE Grid & Cloud Computing Introduction
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Services for Distributed e-Infrastructure Access Tiziana Ferrari on behalf.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI IGTF & EUGridPMA status update SHA-2 – and more (David Groep,
EGI-InSPIRE RI ICT 16 Big Data Research H2020 Work Programme, Leadership in enabling and industrial technologies and ICT (R&I+CSA) –Challenge:
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI John Gordon EGI Virtualisation and Cloud Workshop Amsterdam 13 th May 2011.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI John Gordon EGI Virtualisation and Cloud Workshop Amsterdam 12 th May 2011.
EGI-InSPIRE RI EGI-InSPIRE RI EGI-InSPIRE Software provisioning and HTC Solution Peter Solagna Senior Operations Manager.
Cloud Security Session: Introduction 25 Sep 2014Cloud Security, Kelsey1 David Kelsey (STFC-RAL) EGI-Geant Symposium Amsterdam 25 Sep 2014.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI SA1.2 Plans 2013 Security Operations David Kelsey (STFC) 26/02/2013 Operations.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI D4.4 and the EGI review Dr Linda Cornwall 19 th Sept 2011 D4.41.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI SVG F2F Virtual Machines VM images, software run on VMS. 3 rd March 2015.
EGI Security Risk Assessment
Software Vulnerability Group Status update
David Kelsey (STFC-RAL)
Prevention is better than Cure
Dr Linda Cornwall STFC/RAL EGI OMB 27th September 2013
Presentation transcript:

EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud F2F Security Issues in the cloud Introduction Linda Cornwall, STFC 10/20/2015 1

EGI-InSPIRE RI In general Focus is on making things happen Getting the functionality in place What the user wants to do Not a bad thing Security tends to get added later Security groups in EGI still very focused on the Grid Lack manpower for doing much more However, Federated cloud and EGI security groups need to better engage 10/20/2015 EGI Federated Cloud F2F, January Linda Cornwall 2

EGI-InSPIRE RI I’ve heard it said… Security doesn’t matter in the Cloud If something is running in a VM then no- one is interested in what I am doing, it doesn’t affect anyone else. I can do it easily on Amazon, why not here? 10/20/2015 EGI Federated Cloud F2F, January Linda Cornwall 3

EGI-InSPIRE RI No one interested in what I do on VM The VO who is providing access may not want something done outside policy E.g. bitcoin mining Something may be done which affects us Attempts at RSA cracking 10/20/2015 EGI Federated Cloud F2F, January Linda Cornwall 4

EGI-InSPIRE RI Work not confined to VM Users will need to access and store data Credentials will need to be used to access and store data External connectivity is needed Jobs will not all be confined to 1 VM Many jobs may require a number of VMs A need for connectivity between them If a VO sets up a Virtual grid in federated cloud, similar security implications apply to current Grid infrastructure 10/20/2015 EGI Federated Cloud F2F, January Linda Cornwall 5

EGI-InSPIRE RI Non-Repudiation With discussions on the possibility of billing a user, this becomes more important. High impact on traceability, secure logging, 10/20/2015 EGI Federated Cloud F2F, January Linda Cornwall 6

EGI-InSPIRE RI EGI Security Threat Risk Assessment In 2012 EGI carried out a security Threat risk assessment. Threat of highest risk value was “New Software or technology may be installed which leads to security problems” Also High, specifically “The move to Cloud technologies may lead to security problems” 10/20/2015 EGI Federated Cloud F2F, January Linda Cornwall 7

EGI-InSPIRE RI Attack from the EGI Federated Cloud One of the highest impact risk factors in the Security Threat Risk assessment was “Resources used for on-line attack to external parties” Assuming external access is possible, then this could happen. Traceability is important Tools to kill VMs, prevent further malicious jobs needed. Hopefully won’t happen, but due diligence is needed 10/20/2015 EGI Federated Cloud F2F, January Linda Cornwall 8

EGI-InSPIRE RI EGI Security Policy Group The EGI Security Policy Group provides various documents These continue to apply in the Federated Cloud environment These will probably get updated, new ones added as the need arises Particularly relevant: Security Policy for the Endorsement and Operation Of Virtual Machine images /20/2015 EGI Federated Cloud F2F, January Linda Cornwall 9

EGI-InSPIRE RI Security issues continue Many of the issues concerning the Grid continue into the Cloud e.g. Authentication, Authorization Data access and storage Protection of credentials Traceability Security related activities need to continue, Policy definition Security Monitoring Software Vulnerability handling Incident handling, Provision of software to enable secure sharing of resources 10/20/2015 EGI Federated Cloud F2F, January Linda Cornwall 10

EGI-InSPIRE RI Getting Federated Cloud Certification for EGI infrastructure There is a plan to have a questionnaire concerning Federated Clouds Check that appropriate security measures are in place CSIRT will not recommend certification unless they are happy Sven Gabriel will talk about this 10/20/2015 EGI Federated Cloud F2F, January Linda Cornwall 11

EGI-InSPIRE RI Questions ?? 10/20/2015 EGI Federated Cloud F2F, January Linda Cornwall 12

EGI-InSPIRE RI /20/2015 EGI Federated Cloud F2F, January Linda Cornwall 13