EGEE-II INFSO-RI-031688 Enabling Grids for E-sciencE www.eu-egee.org EGEE and gLite are registered trademarks EGEE and OSG: Common Security Policies? OSG.

Slides:



Advertisements
Similar presentations
Grid Security Policy GridPP18, Glasgow David Kelsey 21sr March 2007.
Advertisements

Grid Security Users, VOs, Sites OSG Collaboration Meeting University of Washington Bob Cowles August 23, 2006 Work supported.
INFSO-RI Enabling Grids for E-sciencE Update on LCG/EGEE Security Policy and Procedures David Kelsey, CCLRC/RAL, UK
INFSO-RI Enabling Grids for E-sciencE JRA3 2 nd EU Review Input David Groep NIKHEF.
Joining the Grid Andrew McNab. 28 March 2006Andrew McNab – Joining the Grid Outline ● LCG – the grid you're joining ● Related projects ● Getting a certificate.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
Grid Trust Fabric TNC 2006, Catania 16 May 2006 David Kelsey CCLRC/RAL, UK
INFSO-RI Enabling Grids for E-sciencE Incident Response Policies and Procedures Carlos Fuentes
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Security Policy Group EGI Technical Forum Sep 2010 David Kelsey.
EGEE ARM-2 – 5 Oct LCG Security Coordination Ian Neilson LCG Security Officer Grid Deployment Group CERN.
INFSO-RI Enabling Grids for E-sciencE SA1: Cookbook (DSA1.7) Ian Bird CERN 18 January 2006.
GGF12 – 20 Sept LCG Incident Response Ian Neilson LCG Security Officer Grid Deployment Group CERN.
Deployment Issues David Kelsey GridPP13, Durham 5 Jul 2005
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
JSPG: User-level Accounting Data Policy David Kelsey, CCLRC/RAL, UK LCG GDB Meeting, Rome, 5 April 2006.
Security Area in GridPP2 4 Mar 2004 Security Area in GridPP2 “Proforma-2 posts” overview Deliverables – Local Access – Local Usage.
INFSO-RI Enabling Grids for E-sciencE EGEE/LCG Joint Security Policy Group David Kelsey, CCLRC/RAL, UK EGEE.
Responsibilities of ROC and CIC in EGEE infrastructure A.Kryukov, SINP MSU, CIC Manager Yu.Lazin, IHEP, ROC Manager
Security Policy Update LCG GDB Prague, 4 Apr 2007 David Kelsey CCLRC/RAL
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
9-Sep-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security (Report from the LCG Security Group) CERN, 9 September 2003 David Kelsey CCLRC/RAL, UK
23-Oct-03D.P.Kelsey, LCG Security Update, HEPiX1 LCG Security Update HEPiX-HEPNT, TRIUMF, 23 October 2003 David Kelsey CCLRC/RAL, UK
8-Jul-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security (Report from the LCG Security Group) RAL, 8 July 2003 David Kelsey CCLRC/RAL, UK
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Next steps with EGEE EGEE training community.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks JSPG Status and plans EGEE’06 Conference.
INFSO-RI Enabling Grids for E-sciencE External Projects Integration Summary – Trigger for Open Discussion Fotis Karayannis, Joanne.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Linda Cornwall CCLRC (RAL) FP6 Security workshop.
LCG/EGEE Security Operations HEPiX, Fall 2004 BNL, 22 October 2004 David Kelsey CCLRC/RAL, UK
15-Dec-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the Joint Security Policy Group) CERN 15 December 2004 David Kelsey CCLRC/RAL,
9-Oct-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security (Report from the LCG Security Group) FNAL 9 October 2003 David Kelsey CCLRC/RAL, UK
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks SA1: Grid Operations Maite Barroso (CERN)
Grid Security Vulnerability Group Linda Cornwall, GDB, CERN 7 th September 2005
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
INFSO-RI Enabling Grids for E-sciencE EGEE SA1 in EGEE-II – Overview Ian Bird IT Department CERN, Switzerland EGEE.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Dr Linda Cornwall CCLRC (RAL) FP6 Security workshop.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks ROC Security Contacts R. Rumler Lyon/Villeurbanne.
Security Operations David Kelsey GridPP Deployment Board 3 Mar 2005
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
INFSO-RI Enabling Grids for E-sciencE An overview of EGEE operations & support procedures Jules Wolfrat SARA.
Security Policy: From EGEE to EGI David Kelsey (STFC-RAL) 21 Sep 2009 EGEE’09, Barcelona david.kelsey at stfc.ac.uk.
Security Policy Update WLCG GDB CERN, 14 May 2008 David Kelsey STFC/RAL
June 6, 2006OSG - Draft VO AUP1 Open Science Grid Trust as a Foundation June 6, 2006 Keith Chadwick.
EGI-InSPIRE RI EGI EGI-InSPIRE RI Service Operations Security Policy the new generalised site operations security policy.
EGI-InSPIRE RI EGI EGI-InSPIRE RI Establishing Identity in EGI the authentication trust fabric of the IGTF and EUGridPMA.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks EGEE and JSPG activities David Kelsey CCLRC/RAL.
Security EGEE/SA1 ROC Managers ARM-3 meeting Lyon, 17 March 2005 David Kelsey CCLRC/RAL, UK
EGEE ARM-2 – 5 Oct LCG/EGEE Security Coordination Ian Neilson Grid Deployment Group CERN.
JSPG Update David Kelsey MWSG, Zurich 31 Mar 2009.
12-Jun-03D.P.Kelsey, CA meeting1 CA meeting Minimum Requirements CERN, 12 June 2003 David Kelsey CCLRC/RAL, UK
18-May-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the LCG Security Group) Barcelona 18 May 2004 David Kelsey CCLRC/RAL, UK
SEE-GRID The SEE-GRID initiative is co-funded by the European Commission under the FP6 Research Infrastructures contract no SEE-GRID.
Security Policy Update WLCG GDB CERN, 8 Dec 2010 David Kelsey STFC/RAL david.kelsey AT stfc.ac.uk.
Planning for LCG Emergencies HEPiX, Fall 2005 SLAC, 13 October 2005 David Kelsey CCLRC/RAL, UK
Recent lessons learned: Operational Security David Kelsey CCLRC/RAL, UK GDB Meeting, BNL, 5 Sep 2006.
INFSO-RI Enabling Grids for E-sciencE Joint Security Policy Group David Kelsey, CCLRC/RAL, UK 3 rd EGEE Project.
7-May-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Issues and Planning or Report from the Security Group CERN, 8 May 2003 David Kelsey CCLRC/RAL, UK.
LCG User, Site & VO Registration in EGEE/LCG Bob Cowles OSG Technical Meeting Dec 15-17, 2004 UCSD.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security aspects (based on Romain Wartel’s.
Security Bob Cowles
Grid Security Policy: EGEE to EGI David Kelsey (RAL) 16 Sep 2009 JSPG meeting, DFN Berlin david.kelsey at stfc.ac.uk.
INFSO-RI Enabling Grids for E-sciencE Update on LCG/EGEE Security Policy and Procedures David Kelsey, CCLRC/RAL, UK
15-Jun-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the LCG Security Group) CERN 15 June 2004 David Kelsey CCLRC/RAL, UK
Security Policy Update WLCG GDB CERN, 11 June 2008 David Kelsey STFC/RAL
Bob Jones EGEE Technical Director
David Kelsey CCLRC/RAL, UK
Open Science Grid Consortium Meeting
LCG Security Status and Issues
David Kelsey CCLRC/RAL, UK
LCG/EGEE Incident Response Planning
David Kelsey CCLRC/RAL, UK
Presentation transcript:

EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks EGEE and OSG: Common Security Policies? OSG Consortium Meeting Seattle, 21 Aug 2006 David Kelsey CCLRC/RAL

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE/OSG Security - D Kelsey 2 Overview Joint Security Policy Group –Introduction and History The Grid/VO/Site/User “model” Interoperable Policy and Procedures The set of Security Policy documents –Recent & current work EGEE and OSG commonalities and divergences N.b. not discussing security operations or vulnerability handling activities

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE/OSG Security - D Kelsey 3 History LCG Security Group was created in early 2003 –LHC Computing Grid (Particle Physics) Mandate To advise and make recommendations to the Grid Deployment Manager and LCG GDB on all matters related to Security –Policies are agreed and adopted by GDB for LCG To produce and maintain –Policies and procedures on Registration, Authentication, Authorization and Security Where necessary recommend the creation of focussed task-forces made-up of appropriate experts –E.g. Task force on LCG User Registration

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE/OSG Security - D Kelsey 4 JSPG Following first EGEE collaboration meeting (April 2004) –Scope of group extended –To include a proposed EGEE SA1 Site Security Group Joint Security Policy Group (JSPG) –“Joint” initially means EGEE and LCG –Strong participation by USA Open Science Grid –Now “Joint” = EGEE/OSG/WLCG An activity of EGEE SA1 (Deployment & Operations) –Discusses all documents with ROC Managers –Participation of site managers/security officers Strong links to EGEE Middleware Security Group New “task force” (added after 2 nd EGEE meeting) –SA1 Operational Security Coordination Team (OSCT)

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE/OSG Security - D Kelsey 5 JSPG membership Application representatives/VO managers –Discussions with VO managers as/when required Site Security Officers –Bob Cowles (SLAC), Denise Heagerty (CERN), & in the past - Dane Skow (FNAL) Site/Resource Managers/Security Contacts –Dave Kelsey (RAL) – Chair –Miguel Cardenas Montes (Spain) Security middleware experts/developers –Joni Hahkala (JRA3), David Groep (JRA3), Andrew McNab (GridPP), Yuri Demchenko (JRA3) CERN Deployment team –Maria Dimou, Ian Neilson (Security Officer) Now expanding to include other EU Grid projects –SEE-Grid, DEISA, Diligent Other EU Infrastructure projects use our policies –BalticGrid, EELA, EUMedGrid, EUChinaGrid

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE/OSG Security - D Kelsey 6 Grid/VO/Site/User Model Users –only need a single electronic identity –They register once per VO (and renew) –Can/do belong to more than one VO –do not register at sites or Grids Virtual Organisations (VO) –register with Grid (again once per Grid) –Aim for single instance of VO membership database –To be used across multiple Grids Sites –can/do provide resources to multiple Grids –register with Grid (once per Grid) –decide which VOs to support  Distributed Grid Operations facilitates this Deployment, configuration etc

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE/OSG Security - D Kelsey 7 Grid Trust Many components (in ascending scale of difficulty) –Technical  Interoperable security, standards-based –Policy and Procedures  Ensure participants act in a predictable way –Legal  International aspects particularly hard  Data and personal privacy issues –Social  Have spent last 6 years building “trust” (IGTF)  Many face to face meetings  Last 2 years, working towards a federated approach Sites need to trust VO’s (and vice versa) –To take care of Users, Data, Operations, …

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE/OSG Security - D Kelsey 8 Interoperable Policies Aim to allow applications (VO’s) to easily use resources in multiple Grids The simplest approach –Common Policies  User AUP  Site AUP  VO AUP  Operational procedures and other policies If not common then at least not conflicting –Does NOT override local site and network security policy EGEE working with other EU Grid projects –Common policies and procedures EU eInfrastructure Reflection Group (eIRG) –Common approach at highest level  EGEE inputs policy for consideration

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE/OSG Security - D Kelsey 9 A global, federated e-Infrastructure EGEE infrastructure ~ 200 sites in 39 countries ~ CPUs > 5 PB storage > concurrent jobs per day > 60 Virtual Organisations EUIndiaGrid EUMedGrid SEE-GRID EELA BalticGrid EUChinaGrid OSG NAREGI

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE/OSG Security - D Kelsey 10 EGEE/LCG Policy Security & Availability Policy Site & VO Policies Certification Authorities Audit Requirements Incident Response User Registration & VO Management Application Development & Network Admin Guide picture from Ian Neilson Grid & VO AUPs

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE/OSG Security - D Kelsey 11 Recent/Current JSPG work Recently approved –Grid AUP –VO Security Policy (requires a VO AUP) –CA Approval (using IGTF accredited CA’s) All other documents need updating (this year) Current work –Top-level Security Policy document  Defines roles and responsibilities, sanctions etc –Site Operational Procedures Policy –VO Naming (use DNS style) –User-level Accounting data policy (privacy issues) All new documents are aimed to be simple and general, e.g. apply to “Grid” not “EGEE” (like the Grid AUP)

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE/OSG Security - D Kelsey 12 EGEE/OSG Commonalities and Divergences? Some initial thoughts –Hopefully more will become clear during this meeting! Common –Grid AUP –Security Incident Response –CA Approval Divergent –EGEE assumes Sites already have appropriate policies  Just add the Grid specific extras –VO AUP?  Will VO’s be willing to assume responsibility for users?  VO’s are not legal entities  Are VO’s capable of operations and risk analysis? –Data Privacy legal issues? –We do need to work jointly on these issues JSPG working on new top-level policy document –Can we agree a common version for use in OSG and EGEE?

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE/OSG Security - D Kelsey 13 Summary To date, JSPG has successfully created some policies which are common between EGEE and OSG OSG Risk Analysis –Very useful input to EGEE Very desirable that we continue to aim for common policies –To allow VO’s to easily use multiple Grids If this is not possible, then understand why not –And fix it? Where there are/need to be differences –Keep these as separate components

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE/OSG Security - D Kelsey 14 JSPG Meetings, Web etc Meetings - Agenda, presentations, minutes etc JSPG Web site Membership of the JSPG mail list is closed, BUT –Requests to join stating reasons to D Kelsey –Volunteers to work with us are always welcome! Policy documents at

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE/OSG Security - D Kelsey 15 Grid AUP (1) By registering with the Virtual Organization (the "VO") as a GRID user you shall be deemed to accept these conditions of use: 1. You shall only use the GRID to perform work, or transmit or store data consistent with the stated goals and policies of the VO of which you are a member and in compliance with these conditions of use. 2. You shall not use the GRID for any unlawful purpose and not (attempt to) breach or circumvent any GRID administrative or security controls. You shall respect copyright and confidentiality agreements and protect your GRID credentials (e.g. private keys, passwords), sensitive data and files. 3. You shall immediately report any known or suspected security breach or misuse of the GRID or GRID credentials to the incident reporting locations specified by the VO and to the relevant credential issuing authorities.

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE/OSG Security - D Kelsey 16 Grid AUP (2) 4. Use of the GRID is at your own risk. There is no guarantee that the GRID will be available at any time or that it will suit any purpose. 5. Logged information, including information provided by you for registration purposes, shall be used for administrative, operational, accounting, monitoring and security purposes only. This information may be disclosed to other organizations anywhere in the world for these purposes. Although efforts are made to maintain confidentiality, no guarantees are given. 6. The Resource Providers, the VOs and the GRID operators are entitled to regulate and terminate access for administrative, operational and security purposes and you shall immediately comply with their instructions. 7. You are liable for the consequences of any violation by you of these conditions of use.

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE/OSG Security - D Kelsey 17 Example VO AUP This acceptable Use Policy applies to all members of Virtual Organization, hereafter referred to as the VO, with reference to use of the LCG/EGEE Grid infrastructure, hereafter referred to as the Grid. The Geant4-Spokesman, owns and gives authority to this policy. The goal of the VO is to validate the software they provide to their users (HEP experiments as ATLAS, CMS, LHCb, Babar, etc, Astrophysics applications, biomedical communities) twice per year within the Grid environment. This procedure should cover a wide range of parameters and physical models which are high CPU demanding. At the same time they are planning to use regularly the LCG/EGEE resources to make analysis and studies of their toolkit. Members and Managers of the VO agree to be bound by the Grid Acceptable Use Policy, VO Security Policy and other relevant Grid Policies, and to use the Grid only in the furtherance of the stated of the VO.

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE/OSG Security - D Kelsey 18 Site Operational Procedures Policy DRAFT (under discussion) By registering with the Infrastructure as a Site, you and your organization will be deemed to have accepted these operational procedures and policies, complementary to any agreements that may be in place between the Site and any specific Virtual Organization (VO) or any specific Project, and subject to applicable legislation: 1. You shall provide and maintain accurate contact information as specified in the Site Registration Policy, including but not limited to at least one Administrative Contact (Site Manager) and one Site Security Contact, in a central repository provided by the Project. Both shall respond to enquiries in a timely fashion, but at least within 3 business days; 2. You shall read and abide by the security policies, as published by the Joint Security Policy Group (JSPG) and approved by the Project. You shall periodically self-assess your compliance with these policies, inform the Security Officer of violations encountered in the assessment, and correct such violations forthwith. The Security Officer shall apply appropriate restrictions to the circulation of disclosed information consistent with enforcement and improvement of operational and security policies and procedures. 3. Before publishing resource information in resource information systems designated by the Project, you shall ascertain that such resource information is valid and correct to the extent this can be realistically validated. You shall not intentionally publish resource information to resource information systems that is detrimental to the operation of the Infrastructure, or mislead users or their agents into submitting workload, data or information to your Site;

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE/OSG Security - D Kelsey 19 Site Policy (2) 4. By accepting workload, data or information from a specific User or VO, you agree to comply with the User or VO requirements as expressed in their respective Acceptable Use Policies, including those relating to accounting and audit data; 5. You shall implement all relevant patches for security vulnerabilities and for flaws that may impair operation of the Infrastructure, for all pieces of software installed at your Site, and – to the extent possible – on other systems that affect the integrity of your Site; 6. Logged information, including information provided to you by Users or by the Project, shall be used for administrative, operational, accounting, monitoring and security purposes only. You should exert due diligence in maintaining the confidentiality of this information; 7. Provisioning of resources to the Infrastructure is at your own risk. Software is provided by the Project only as-is, and subject to its own license conditions, and there is no guarantee that any procedure used by the Project is either correct or sufficient for any particular purpose;

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE/OSG Security - D Kelsey 20 Site Policy (3) 8. Your Site shall support at least one VO, designated by the Project, for the sole purpose of evaluating the availability of Grid Services at your Site, subject to the provisions made in Article 9. The Project provides to the Site the Acceptable Use Policy and the Security Plan of said VO; 9. You have the right to regulate and terminate access to Users and VOs at any time for administrative, operational and security purposes. In the case of the Project VO described in Article 8 above, support for the VO must be restored as soon as reasonably possibly. You shall inform the affected Users or VO(s) and comply with the Grid Incident Handling policy regarding the notification of security incidents; 10. The Project, the Infrastructure management, and their delegates have the right to block your access to the Infrastructure, and to remove or block your resource information from resource information systems, in the case that you consistently fail to comply with this Policy or any of its subordinate Policies (managerial removal), and at any time in case of urgent operational reasons (operational removal). After managerial removal, the mention of your site in both resource information directories as well as in any other publications may be withdrawn. The Project reserves the right to announce, within the Project, any policy violations by your Site, if you fail to respond to and correct such violations in a timely fashion. The Project will facilitate communications between Sites, VOs, Software providers, and Users, in order to enable your Site’s compliance with this Policy; This policy shall be signed by an Authorized Signatory of your Organization.