Placeholder ES 1 CERN IT Experiment Support group Authentication and Authorization (AAI) issues concerning Storage Systems and Data Access Pre-GDB, 2013-02-12.

Slides:



Advertisements
Similar presentations
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Advertisements

29 June 2006 GridSite Andrew McNabwww.gridsite.org VOMS and VOs Andrew McNab University of Manchester.
Configuration Management
GUMS status Gabriele Carcassi PPDG Common Project 12/9/2004.
Access Control Chapter 3 Part 3 Pages 209 to 227.
GW Introduction to Google Drive Security and Smart Sharing Practices.
Mr C Johnston ICT Teacher
Access Control Methodologies
Lesson 17: Configuring Security Policies
Haga clic para cambiar el estilo de título Haga clic para modificar el estilo de subtítulo del patrón DIRAC Framework A.Casajus and R.Graciani (Universitat.
Securing and Sharing Files Over The Internet (Content Server Security) By Amihay Schwarz Instructor: Viktor Kulikov Software System Laboratory Department.
WLCG Security TEG, risks and Identity Management David Kelsey GridPP28, Manchester 18 Apr 2012.
OWASP Mobile Top 10 Why They Matter and What We Can Do
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
SSC2 and Update on Multi-user Pilot Jobs Framework Mingchao Ma, STFC – RAL HEPSysMan Meeting 20/06/2008.
Systems Security & Audit Operating Systems security.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Designing Active Directory for Security
IOS110 Introduction to Operating Systems using Windows Session 8 1.
Publication and Protection of Site Sensitive Information in Grids Shreyas Cholia NERSC Division, Lawrence Berkeley Lab Open Source Grid.
Storage TEG “emerging” observations and recommendations Wahid Bhimji With contributions from the SM editors (listed in intro)
Ákos FROHNER – DataGrid Security Requirements n° 1 Security Group D7.5 Document and Open Issues
Security+ All-In-One Edition Chapter 19 – Privilege Management Brian E. Brzezicki.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
PanDA Multi-User Pilot Jobs Maxim Potekhin Brookhaven National Laboratory Open Science Grid WLCG GDB Meeting CERN March 11, 2009.
JSPG: User-level Accounting Data Policy David Kelsey, CCLRC/RAL, UK LCG GDB Meeting, Rome, 5 April 2006.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Communicating Security Assertions over the GridFTP Control Channel Rajkumar Kettimuthu 1,2, Liu Wantao 3,4, Frank Siebenlist 1,2 and Ian Foster 1,2,3 1.
Maarten Litmaath (CERN), GDB meeting, CERN, 2006/02/08 VOMS deployment Extent of VOMS usage in LCG-2 –Node types gLite 3.0 Issues Conclusions.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Ákos FROHNER – DataGrid Security n° 1 Security Group D7.6 Design Ideas
WP3 Authorization and R-GMA Linda Cornwall WP3 workshop 2-4 April 2003.
30-Sep-03D.P.Kelsey, SCG Summary1 Security Co-ordination Group (WP7 SCG) EDG Heidelberg 30 September 2003 David Kelsey CCLRC/RAL, UK
Legion - A Grid OS. Object Model Everything is object Core objects - processing resource– host object - stable storage - vault object - definition of.
1 User Analysis Workgroup Discussion  Understand and document analysis models  Best in a way that allows to compare them easily.
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
VO Box Issues Summary of concerns expressed following publication of Jeff’s slides Ian Bird GDB, Bologna, 12 Oct 2005 (not necessarily the opinion of)
OSG Site Admin Workshop - Mar 2008Using gLExec to improve security1 OSG Site Administrators Workshop Using gLExec to improve security of Grid jobs by Alain.
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
Andrew McNab - Security issues - 4 Mar 2002 Security issues for TB1+ (some personal observations from a WP6 and sysadmin perspective) Andrew McNab, University.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
INFSO-RI Enabling Grids for E-sciencE SRMv2.2 in DPM Sophie Lemaitre Jean-Philippe.
Andrew McNab - Dynamic Accounts - 2 July 2002 Dynamic Accounts in TB1.3 What we could do with what we’ve got now... Andrew McNab, University of Manchester.
Ákos FROHNER – DataGrid Security n° 1 Security Group TODO
Handling of T1D0 in CCRC’08 Tier-0 data handling Tier-1 data handling Experiment data handling Reprocessing Recalling files from tape Tier-0 data handling,
Security Vulnerability Detection and reduction Linda Cornwall MWSG, CERN 24 Feb 2005
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
The GRIDS Center, part of the NSF Middleware Initiative Grid Security Overview presented by Von Welch National Center for Supercomputing.
INFSO-RI Enabling Grids for E-sciencE Enabling Grids for E-sciencE Storage Element Model and Proposal for Glue 1.3 Flavia Donno,
Site Authorization Service Local Resource Authorization Service (VOX Project) Vijay Sekhri Tanya Levshina Fermilab.
Placeholder ES 1 CERN IT EGI Technical Forum, Experiment Support group AAI usage, issues and wishes for WLCG Maarten Litmaath CERN.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
VO Box discussion ATLAS NIKHEF January, 2006 Miguel Branco -
Jean-Philippe Baud, IT-GD, CERN November 2007
AuthN and AuthZ in StoRM A short guide
OGF PGI – EDGI Security Use Case and Requirements
Status of the SRM 2.2 MoU extension
CRIC ・ Authentication & Authorization
LCG/EGEE Incident Response Planning
SRM v2.2 / v3 meeting report SRM v2.2 meeting Aug. 29
WLCG security landscape in EGI and beyond Maarten Litmaath CERN v1
Data Management cluster summary
Grid Security M. Jouvin / C. Loomis (LAL-Orsay)
INFNGRID Workshop – Bari, Italy, October 2004
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

placeholder ES 1 CERN IT Experiment Support group Authentication and Authorization (AAI) issues concerning Storage Systems and Data Access Pre-GDB, Maarten Litmaath

placeholder ES 2 CERN IT History Security TEG WG “AAI on Storage Systems” –Jointly with Data & Storage Management TEGs – Summary of status quo and issues presented in pre-GDB of Feb 7, 2012 Some further discussion on Security/DM/SM TEG mailing lists Summary document at v0.4 since Apr 2, 2012 –Attached to the Twiki page

placeholder ES 3 CERN IT Status quo (1) Storage element and catalog configurations –Production/group data is protected against modification by unprivileged users –Tape access by unprivileged users is essentially prevented –User and group access are regulated by the experiment frameworks Including quotas An SE may in fact be more permissive than desired  to be checked and fixed as needed

placeholder ES 4 CERN IT Status quo (2) Dealing with X509 overhead –Use bulk methods, sessions or trusted hosts where needed Hosts should at most be trusted within sites –Look into cheap, short-lived session tokens? Implementation may be expensive ALICE use security envelopes for data operations –Minimal potential damage when stolen CASTOR NS and RFIO backdoors are being closed –Insecure legacy clients being phased out

placeholder ES 5 CERN IT Data protection issues (1) Do different data classes need the same protection? –Custodial  highest security to protect against tampering –Cached  can be replaced, but can the security therefore be relaxed? –User  highest security to protect against tampering and reading by others

placeholder ES 6 CERN IT Data protection issues (2) Read access based on data confidentiality? –Requires careful management of categories  expensive and/or bound to fail? At least access to user data should be managed carefully –By default none of the data of one VO shall be readable by another Thus incur security overhead also for large volumes that could be made public –Use bulk methods, sessions, trusted hosts as needed –Most of the data is transferred over insecure channels! Bulk encryption may remain too expensive

placeholder ES 7 CERN IT Data protection issues (3) Access audit trails are important for traceability –For security Tampering with existing data Upload of illegal data Access to confidential data DoS attack –For investigations of performance issues Which DN / VO is overloading my service? Traceability questionnaire: – –Does your service record the necessary things, store the information in the right place with the right retention period and access control?

placeholder ES 8 CERN IT Data protection issues (4) Protection is needed or desirable against: –Information leakage  not only the data, but also the file names matter “Higgs-discovery.root” Read access to directories and logs to be regulated Encrypt selected low-rate traffic? –Accidental commands  restrict write access as much as possible Protect generic production data Confine each analysis group to its own area Protect user data –Attacks See next page

placeholder ES 9 CERN IT Data protection issues (5) Protection against attacks –By outsiders exploiting a bug or doing a DoS –By insiders, or outsiders using stolen credentials Maintain as few privileges as possible per VO member –May also help prevent accidents… Use multi-person authorization (“two-man rule”) for bulk data removal of VO-wide or group data? –Ditto… Also the SE itself needs protection –Against upload of illegal data –Against DoS

placeholder ES 10 CERN IT Issues with data ownership (1) Missing concept: data owned by a VO, subgroup or service. –Historically the DNs of production managers were and are still being used as owners What if such a person moves on? –See next page What if such a person also works on private analysis? –Privileged access to data may remain »Wrong proxy used by mistake for analysis »Storage element may couple privileges to DN –Use robot certificates instead? At least ATLAS do that already

placeholder ES 11 CERN IT Issues with data ownership (2) Mapping a person to/from a credential –DN changes may affect data ownership Ownership could be by the user’s VOMS nickname or a generic attribute instead of the DN –A big change, but maybe well worth the investment? –Can we do this per SE type? –Can we do this per SE instance? –Natural nickname candidate: CERN account name »Each user is in the CERN HR DB  can have an account –ATLAS already use nicknames in some of their services ALICE: LDAP server supports multiple DNs per user –Might such an approach be less cumbersome?

placeholder ES 12 CERN IT Issues with data ownership (3) Mapping a person to/from a credential –X509 vs. Kerberos access Is this only relevant for a few cases, e.g. EOS? –Try to avoid encumbering other SE types or instances How to map Kerberos principal to/from DN? –Yet another map-file? –Use principal for ownership, map DN to it? –Use principal as VOMS nickname or generic attribute? »See previous page VOMS groups could be determined from map-file –Cf. dCache “vo-role-mapfile” –For writing a primary group may need to be decided »It could be taken from the directory instead

placeholder ES 13 CERN IT Issues with data ownership (4) VO superuser concept desirable? –Avoid bothering SE admin for cleanups –Useful at least to ATLAS –How can different SE types implement this? Maybe more relevant for certain types?

placeholder ES 14 CERN IT Cloud storage Do we need to be concerned about cloud storage in the context of these discussions? –Can cloud storage technologies suggest answers to some of the questions? –Do we just need to be concerned with a grid layer on top of such storage? Cloud storage might be just another back-end