Security Vulnerability Identification and Reduction Linda Cornwal, JRA1, Brno 20 th June 2005

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Security Vulnerabilities Dr Linda Cornwall,
Advertisements

Last update 01/06/ :23 LCG 1Maria Dimou- cern-it-gd Maria Dimou IT/GD Site Registration policy & procedures
Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
Grid Security Users, VOs, Sites OSG Collaboration Meeting University of Washington Bob Cowles August 23, 2006 Work supported.
INFSO-RI Enabling Grids for E-sciencE Update on LCG/EGEE Security Policy and Procedures David Kelsey, CCLRC/RAL, UK
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
SOA Security Chapter 12 SOA for Dummies. Outline User Authentication/ authorization Authenticating Software and Data Auditing and the Enterprise Service.
Computer Security: Principles and Practice
Risk Management.
Overview of MASH MASH training. What is a MASH?  Multi Agency Safeguarding Hub  A MASH is a centre which brings together agencies (and their information)
INFSO-RI Enabling Grids for E-sciencE Operational Security OSCT JSPG March 2006 Ian Neilson, CERN.
CS 4310: Software Engineering
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI The EGI Software Vulnerability Group and EMI Dr Linda Cornwall, STFC, Rutherford.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGI-InSPIRE The EGI Software Vulnerability Group (SVG) What is a Software Vulnerability?SVG membership and interaction with other groups Most people are.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
INFSO-RI Enabling Grids for E-sciencE Incident Response Policies and Procedures Carlos Fuentes
The Grid Services Security Vulnerability and Risk Assessment Activity in EGEE-II Enabling Grids for E-sciencE EGEE-II INFSO-RI
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Handling Grid Security Vulnerabilities in.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks The Grid Security Vulnerability Group Dr.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks What GGUS can do for you JRA1 All hands.
EGEE is a project funded by the European Union under contract IST Testing processes Leanne Guy Testing activity manager JRA1 All hands meeting,
Deployment Issues David Kelsey GridPP13, Durham 5 Jul 2005
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Security Area in GridPP2 4 Mar 2004 Security Area in GridPP2 “Proforma-2 posts” overview Deliverables – Local Access – Local Usage.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud F2F Security Issues in the cloud Introduction Linda Cornwall,
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSVG issues handling Dr Linda Cornwall CCLRC.
GridPP Deployment & Operations GridPP has built a Computing Grid of more than 5,000 CPUs, with equipment based at many of the particle physics centres.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
Update on the Grid Security Vulnerability Group Linda Cornwall, MWSG7, Amsterdam 14 th December 2005
Security Vulnerabilities Linda Cornwall, GridPP15, RAL, 11 th January 2006
15-Dec-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the Joint Security Policy Group) CERN 15 December 2004 David Kelsey CCLRC/RAL,
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud Security - what is needed Linda Cornwall (STFC) and the.
Grid Security Vulnerability Group Linda Cornwall, GDB, CERN 7 th September 2005
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
Lecture 19 Page 1 CS 236 Online Securing Your System CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
INFSO-RI Enabling Grids for E-sciencE EGEE is a project funded by the European Union under contract INFSO-RI Grid Accounting.
EGEE is a project funded by the European Union under contract IST Support in EGEE Ron Trompert SARA NEROC Meeting, 28 October
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks ROC Security Contacts R. Rumler Lyon/Villeurbanne.
Security Operations David Kelsey GridPP Deployment Board 3 Mar 2005
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Services Security Vulnerability and.
LCG CERN David Foster LCG WP4 Meeting 20 th June 2002 LCG Project Status WP4 Meeting Presentation David Foster IT/LCG 20 June 2002.
Introduction to ITIL and ITIS. CONFIDENTIAL Agenda ITIL Introduction  What is ITIL?  ITIL History  ITIL Phases  ITIL Certification Introduction to.
Security Vulnerability Detection and reduction Linda Cornwall MWSG, CERN 24 Feb 2005
Planning for LCG Emergencies HEPiX, Fall 2005 SLAC, 13 October 2005 David Kelsey CCLRC/RAL, UK
INFSO-RI Enabling Grids for E-sciencE Joint Security Policy Group David Kelsey, CCLRC/RAL, UK 3 rd EGEE Project.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI CSIRT Procedure for Compromised Certificates and Central Security Emergency.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Questionnaires to Cloud technology providers and sites Linda Cornwall, STFC,
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
15-Jun-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the LCG Security Group) CERN 15 June 2004 David Kelsey CCLRC/RAL, UK
INFSO-RI Enabling Grids for E-sciencE Workshop WLCG Security for Grid Sites Louis Poncet System Engineer SA3 - OSCT.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI SVG F2F Virtual Machines VM images, software run on VMS. 3 rd March 2015.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSVG issue handling summary Dr Linda Cornwall.
Directory/Inventory – info sharing for security people
Open Science Grid Consortium Meeting
SA1 Execution Plan Status and Issues
Putting It All Together
Putting It All Together
Grid Services Security Vulnerability and Risk Analysis
Security Engineering.
David Kelsey CCLRC/RAL, UK
EGI Security Risk Assessment
How to Find Your Way Around…
Drew Hunt Network Security Analyst Valley Medical Center
Prevention is better than Cure
Presentation transcript:

Security Vulnerability Identification and Reduction Linda Cornwal, JRA1, Brno 20 th June 2005

20-Jun-05Vulnerability reduction - Linda Cornwall -JRA1 Brno2 Introduction Why do we need to act? What are we protecting and preventing happening by addressing vulnerabilities? How to approach it Addressing Specific Vulnerability issues Discussion

20-Jun-05Vulnerability reduction - Linda Cornwall -JRA1 Brno3 Why do we need to act? We know some vulnerabilities are there, some are being fixed by developers, some are waiting to be exploited by hackers It will be really embarrassing if when LHC comes on line we get a serious attack on the grid system which prevents data being stored or processed Hackers Conference HOPE mentioned Grids –unfriendly people without credentials are becoming aware of us We are deploying real grids, no longer a research/proof of concept activity

20-Jun-05Vulnerability reduction - Linda Cornwall -JRA1 Brno4 What and who are we protecting? Protect the system –Ensure the system is available and working –Cannot be disrupted by an authorized user on purpose or by mistake –Cannot be disrupted by a hacker Protect data –Ensure it is stored in a reliable manner –Ensure it cannot be accessed by those who should not access it (Esp. Confidential data) Protect the user –We need to protect the user from being accused of doing something they did not do –We need to protect the user from doing something they did not intend to do (e.g. running up large bills)

20-Jun-05Vulnerability reduction - Linda Cornwall -JRA1 Brno5 What and who are we protecting? Protect others from our system –Prevent our system being used to crack a certificate by brute force –Prevent denial of service attacks from our system –Ensure it’s not used to store and distribute illegal material –If we don’t take care to address these issues we could find ourselves in serious trouble, it would be more than embarrassing, we may be considered criminally negligent for setting up these systems without sufficient protection Protect the system administrators –do not way to be accused of installing insecure software Protect those developing grid projects –don’t want to be accused of distributing software that has problems

20-Jun-05Vulnerability reduction - Linda Cornwall -JRA1 Brno6 3 way approach Recording known issues –Recording knowledge of specific vulnerabilities or potential vulnerabilities –Getting them dealt with –Most of the rest of this talk is about this Checklists –Things we need to take care of to minimize or avoid vulnerabilities –One for Middleware –One for Deployment –Already presented to MWSG Anti use cases –Use cases that should be prevented

20-Jun-05Vulnerability reduction - Linda Cornwall -JRA1 Brno7 Specific issue logging This is a sensitive issue –There has been a reluctance to write anything down because sysadmins will rightly want info, and then may not want to install the software It was agreed at the EGEE conference in Athens that we will form a vulnerability group to try and tackle specific vulnerability issues We can’t fix everything quickly, we know that Some people wanted all issues making totally public after a certain amount of time We can’t take the same approach as other projects, e.g. 45 days to fix, then things become completely public We want to ensure grids become more secure and keep them deployed

20-Jun-05Vulnerability reduction - Linda Cornwall -JRA1 Brno8 Purpose of Vulnerability group Inform developers and deployment people of vulnerabilities as they are identified, and encourage them to produce fixes or reduce their impact Aim is to keep grids deployed, keep appropriate people informed, not inform potential hackers, and fix problems It may be necessary to fix problems quickly if a problem is serious, in order to keep grid deployed This is not for incidents – if a vulnerability has been exploited it is handled by incident response Can be seen as incident prevention

20-Jun-05Vulnerability reduction - Linda Cornwall -JRA1 Brno9 Vulnerability organisation (1) Vulnerability group –Members have read and write access to the Savannah grid vulnerability project –Members log any problems they become aware of as bugs in the Grid Vulnerability Savannah –Non members may submit bugs, and they should receive feedback, but they may not read the database –Members may be members of the Grid vulnerability mailing list – which means they may write to the list. (It is not archived publically) –Problems or potential problems may be discussed on the mailing list

20-Jun-05Vulnerability reduction - Linda Cornwall -JRA1 Brno10 Vulnerability Organisation (2) Vulnerability Core –Manage membership of the vulnerability group –Ensure that appropriate people take responsibility for dealing with vulnerabilities Developers Deployment people Appropriate people to carry out risk assessments Information is passed on by appropriate people being members of the vulnerability group –Core group ensures appropriate people are taking action, typically by assigning the vulnerability ‘bug’ to an appropriate person and checking they are dealing with it.

20-Jun-05Vulnerability reduction - Linda Cornwall -JRA1 Brno11 Vulnerability group members Ask to join Are members of an appropriate Grid or e-science project (LCG, EGEE, GridPP…) Are known (first or second hand) to a member of the vulnerability core Should include e.g. –People involved in security policy –Deployment people –Loose Cannons –Developers (at least 2 per development cluster, e.g. MWSG members) –Regional Operational Centre Representatives – possibly should be included in Core group as they ‘know’ people

20-Jun-05Vulnerability reduction - Linda Cornwall -JRA1 Brno12 Process (1) Vulnerability bug is submitted in the Grid Vulnerability Savannah Group members look at it If there is a recommendation for immediate action, this is forwarded to sysadmins –At present via the project-lcg-security- contacts, better approach in work by OSCT

20-Jun-05Vulnerability reduction - Linda Cornwall -JRA1 Brno13 Process (2) If it concerns some EGEE middleware, a reference bug will be placed in jra1mw savannah, referring to the Grid Vulnerability bug but with no details. JRA1 will then be able to look at the problem –This allows bugs to be signed off and fixed in the jra1 procedure, but does not reveal details to potential hackers

20-Jun-05Vulnerability reduction - Linda Cornwall -JRA1 Brno14 Process (3) If the vulnerability cannot be solved in ~45 days inform appropriate deployment people and include risk assessment. –Again, initially project-lcg-security-contacts –But not to the general public If it has been solved, e.g. new software is available, of course pass information on (probably via the deployment process.) –Can be made public after giving time to update installations This is a compromise between going totally public and keeping things confidential

20-Jun-05Vulnerability reduction - Linda Cornwall -JRA1 Brno15 JRA1 involvement JRA1 clusters should be involved, obviously for fixing vulnerability bugs in appropriate MW At least 2 people per cluster should be members of the Grid Vulnerability group –E.g. MWSG member plus one other JRA1 members will probably also be involved in risk assessment

20-Jun-05Vulnerability reduction - Linda Cornwall -JRA1 Brno16 Questions and discussion Are you happy with JRA1 procedure? Any comments? myself to join the list Request membership of the Grid Vulnerability Savannah by logging onto Savannah