Federated Environments and Incident Response: The Worst of Both Worlds? A TeraGrid Perspective Jim Basney Senior Research Scientist National Center for.

Slides:



Advertisements
Similar presentations
Scaling TeraGrid Access A Testbed for Attribute-based Authorization and Leveraging Campus Identity Management
Advertisements

MyProxy Jim Basney Senior Research Scientist NCSA
Science Gateway Security Recommendations Jim Basney Von Welch This material is based upon work supported by the.
Sponsored by the National Science Foundation Campus Policies for the GENI Clearinghouse and Portal Sarah Edwards, GPO March 20, 2013.
Case Studies in Identity Management for Scientific Collaboration 2014 Technology Exchange Jim Basney CILogon This material is.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 23: Internet Authentication Applications.
1/13/05NCASSR PNNL Visit1 Security Tools Area Overview, Credential Management Services, and the PKI Testbed Jim Basney Senior Research Scientist
National Center for Supercomputing Applications Integrating MyProxy with Site Authentication Jim Basney Senior Research Scientist National Center for Supercomputing.
National Center for Supercomputing Applications MyProxy and GSISSH Update Von Welch National Center for Supercomputing Applications University of Illinois.
National Center for Supercomputing Applications PKI and CKM ® Scaling Study NCASSR Kick-off Meeting June 11-12, 2003 Jim Basney
Open Science Grid Use of PKI: Wishing it was easy A brief and incomplete introduction. Doug Olson, LBNL PKI Workshop, NIST 5 April 2006.
 Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM.
National Center for Supercomputing Applications University of Illinois at Urbana-Champaign This material is based upon work supported by the National Science.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Understanding Active Directory
Federated Access to US CyberInfrastructure Jim Basney CILogon This material is based upon work supported by the National Science Foundation.
National Center for Supercomputing Applications University of Illinois at Urbana-Champaign InCommon and TeraGrid Campus Champions Jim Basney
TeraGrid Science Gateway AAAA Model: Implementation and Lessons Learned Jim Basney NCSA University of Illinois Von Welch Independent.
Understanding Active Directory
TeraGrid ’06 National Center for Supercomputing Applications Managing Credentials on the TeraGrid with MyProxy Jim Basney.
Network, Operations and Security Area Tony Rimovsky NOS Area Director
National Center for Supercomputing Applications University of Illinois at Urbana-Champaign Federated Incident Response Jim Basney
NOS Objectives, YR 4&5 Tony Rimovsky. 4.2 Expanding Secure TeraGrid Access A TeraGrid identity management infrastructure that interoperates with campus.
Distributed Web Security for Science Gateways Jim Basney In collaboration with: Rion Dooley Jeff Gaynor
Australian Access Federation Robert Hazeltine Identity and Access Management Enterprise Systems Office.
Distributed Web Security for Science Gateways Jim Basney In collaboration with: Rion Dooley Jeff Gaynor
Middleware challenges to service providers, the Nordic view TERENA, Ingrid Melve, UNINETT.
National Center for Supercomputing Applications University of Illinois at Urbana-Champaign Secure Access to Research Infrastructure via the InCommon Federation.
TeraGrid Science Gateways: Scaling TeraGrid Access Aaron Shelmire¹, Jim Basney², Jim Marsteller¹, Von Welch²,
TNC2004 Rhodes 1 Authentication and access control in Sympa mailing list manager Serge Aumont & Olivier Salaün May 2004.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
GGF12 – 20 Sept LCG Incident Response Ian Neilson LCG Security Officer Grid Deployment Group CERN.
GGF Fall 2004 Brussels, Belgium September 20th, 2004 James Marsteller Pittsburgh Supercomptuing Center
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
National Computational Science National Center for Supercomputing Applications National Computational Science NCSA-IPG Collaboration Projects Overview.
Evolution of the Open Science Grid Authentication Model Kevin Hill Fermilab OSG Security Team.
Federated Access to US CyberInfrastructure Jim Basney CILogon This material is based upon work supported by the National Science.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Tutorial: Building Science Gateways TeraGrid 08 Tom Scavo, Jim Basney, Terry Fleury, Von Welch National Center for Supercomputing.
National Computational Science National Center for Supercomputing Applications National Computational Science Credential Management in the Grid Security.
Authors: Ronnie Julio Cole David
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
Leveraging the InCommon Federation to access the NSF TeraGrid Jim Basney Senior Research Scientist National Center for Supercomputing Applications University.
1 NSF/TeraGrid Science Advisory Board Meeting July 19-20, San Diego, CA Brief TeraGrid Overview and Expectations of Science Advisory Board John Towns TeraGrid.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Identity Management in DEISA/PRACE Vincent RIBAILLIER, Federated Identity Workshop, CERN, June 9 th, 2011.
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
GSI: Security On Teragrid A Introduction To Security In Cyberinfrastructure By Dru Sepulveda.
Sergiu April 2006June 2006 Overview of TeraGrid Security Working Group Activities James Marsteller CISSP, Working Group Chair.
Network, Operations and Security Area Tony Rimovsky NOS Area Director
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Introduction to ITIL and ITIS. CONFIDENTIAL Agenda ITIL Introduction  What is ITIL?  ITIL History  ITIL Phases  ITIL Certification Introduction to.
b2access.eudat.eu B2ACCESS The simple and secure authorisation and authentication platform of EUDAT This work is licensed under the Creative.
Leveraging the InCommon Federation to access the NSF TeraGrid Jim Basney, Terry Fleury, Von Welch TeraGrid Round Table Update May 21, 2009.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
INTRODUCTION TO IDENTITY FEDERATIONS Heather Flanagan, NSRC.
Security Bob Cowles
Fermilab supports several authentication mechanisms for user and computer authentication. This talk will cover our authentication systems, design considerations,
Gateways security Aashish Sharma Security Engineer National Center for Supercomputing Applications (NCSA) University of Illinois at Urbana-Champaign.
National Center for Supercomputing Applications University of Illinois at Urbana-Champaign This material is based upon work supported by the National Science.
Von Welch Emerging NCSA Security R&D NSF CyberSecurity Summit September 28th, 2004 Von Welch
Some data about the CBIC Federation
Federated Environments and Incident Response: The Worst of Both Worlds
A Grid Authorization Model for Science Gateways
Federated Incident Response
TeraGrid Identity Federation Testbed Update I2MM April 25, 2007
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
Presentation transcript:

Federated Environments and Incident Response: The Worst of Both Worlds? A TeraGrid Perspective Jim Basney Senior Research Scientist National Center for Supercomputing Applications University of Illinois at Urbana-Champaign This material is based upon work supported by the National Science Foundation under Grant No Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.

NSF-funded facility to offer high end compute, data and visualization resources to the nation’s academic researchers (7500+ registered users from 450+ organizations) What is the TeraGrid?

TeraGrid Federations TeraGrid Core Services – TeraGrid Central Database (TGCDB) – Manages accounts / allocations across resources / sites – Centralized resource usage accounting X.509 Public Key Infrastructure (PKI) – International Grid Trust Federation (IGTF) (gridpma.org) – Includes Certificate Authorities operating outside of TeraGrid – Single sign-on across TeraGrid systems TeraGrid membership in Shibboleth InCommon Federation (planned) – Campus login to TeraGrid resources by researchers and students TeraGrid Science Gateways Program – Self-managed scientific communities – Gateway acts as identity provider and resource broker

TeraGrid Risks of Primary Concern Service disruption – Account compromise interrupts access for account holder – System compromise interrupts access for all account holders Being the source of attacks on other systems – High performance computers and networks used by attackers – Spread of compromise via stolen credentials Corruption / loss of scientific data – Delay or invalidation of scientific results

TeraGrid Incident Response Single point of contact – – – 24/7/365 response Cross-site coordination for incident response – Centralized ticket tracking system – Emergency contact directory – Secure teleconference lines – Secure lists

Secure List Service (SELS) Being evaluated by TeraGrid Incident Response Team Provides message-level security for s exchanged on mailing lists – Confidentiality, Integrity, and Authentication Minimally trusted List Server – List Server does not get access to plaintext – Proxy encryption techniques enable transformation of ciphertext Developed with COTS and open-source components – Integrated with GnuPG on subscriber side; no extra software to install – Integrated with Mailman on server side with easy installation Lists can be hosted by NCSA sels.ncsa.uiuc.edu

Federated Identity & Incident Response Network attacks across administrative boundaries – Not a new problem but still a challenge! – Coordination across organizational CSIRTs CERT/CC, US-CERT, REN-ISAC, FIRST New challenge: Compromise of federated identity React – Disable access – Revoke credentials – Notify other service providers – Contact identity provider – Contact identity holder Recover – Re-credential identity holder – Coordinate with identity provider – Coordinate with service providers – Restore accounts/systems – Re-enable access Compromise can spill outside the federation

TG Requirements for Federated Identity Ability to contact the Identity Provider – Phone number – address – Public key (PGP, S/MIME) Ability to block unwanted user behavior – Persistent user identifier Ability to directly contact the user – address and/or phone number

TeraGrid Science Gateways gridshib.globus.org Use SAML assertion to convey user identifier and address

Proposed Discussion Topics Support from identity providers for incident response – Preparation – Timely and secure communication – Prompt credential revocation – Confirmation of credential reset / re-issuance – Assistance with incident investigation – Audit records and system logs Effective communication and coordination – Should incident responders contact users directly? – Can the identity provider help to coordinate? Value for incident response of a persistent user identifier – Facilitates blacklisting – eduPersonPrincipalName? eduPersonTargetedID?