EGEE-II INFSO-RI-031688 Enabling Grids for E-sciencE www.eu-egee.org EGEE and gLite are registered trademarks Grid Services Security Vulnerability and.

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Security Vulnerabilities Dr Linda Cornwall,
Advertisements

INFSO-RI Enabling Grids for E-sciencE Update on LCG/EGEE Security Policy and Procedures David Kelsey, CCLRC/RAL, UK
INFSO-RI Enabling Grids for E-sciencE Operational Security OSCT JSPG March 2006 Ian Neilson, CERN.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI The EGI Software Vulnerability Group and EMI Dr Linda Cornwall, STFC, Rutherford.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGI-InSPIRE The EGI Software Vulnerability Group (SVG) What is a Software Vulnerability?SVG membership and interaction with other groups Most people are.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
The Grid Services Security Vulnerability and Risk Assessment Activity in EGEE-II Enabling Grids for E-sciencE EGEE-II INFSO-RI
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Handling Grid Security Vulnerabilities in.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
INFSO-RI Enabling Grids for E-sciencE SA1: Cookbook (DSA1.7) Ian Bird CERN 18 January 2006.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks The Grid Security Vulnerability Group Dr.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Security Vulnerability Handling and.
Deployment Issues David Kelsey GridPP13, Durham 5 Jul 2005
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud F2F Security Issues in the cloud Introduction Linda Cornwall,
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks PPS All sites Meeting: Introduction & Agenda.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSVG issues handling Dr Linda Cornwall CCLRC.
GridPP Deployment & Operations GridPP has built a Computing Grid of more than 5,000 CPUs, with equipment based at many of the particle physics centres.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Ake Edlund EGEE Sec Head 9th MWSG meeting, SLAC,
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks NA2 – Dissemination, Outreach and Communication.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Multi-level monitoring - an overview James.
Update on the Grid Security Vulnerability Group Linda Cornwall, MWSG7, Amsterdam 14 th December 2005
Security Vulnerabilities Linda Cornwall, GridPP15, RAL, 11 th January 2006
JRA Execution Plan 13 January JRA1 Execution Plan Frédéric Hemmer EGEE Middleware Manager EGEE is proposed as a project funded by the European.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks EGEE-EGI Grid Operations Transition Maite.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Linda Cornwall CCLRC (RAL) FP6 Security workshop.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks IPv6 test methodology Mathieu Goutelle (CNRS.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks SA1: Grid Operations Maite Barroso (CERN)
Grid Security Vulnerability Group Linda Cornwall, GDB, CERN 7 th September 2005
INFSO-RI Enabling Grids for E-sciencE EGEE SA1 in EGEE-II – Overview Ian Bird IT Department CERN, Switzerland EGEE.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Dr Linda Cornwall CCLRC (RAL) FP6 Security workshop.
The Grid Security Vulnerability Group (GSVG) Enabling Grids for E-sciencE EGEE-III INFSO-RI Eliminating and Preventing.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks ROC Security Contacts R. Rumler Lyon/Villeurbanne.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Progress on first user scenarios Stephen.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Vulnerability handling, Risk management,
Security Vulnerability Identification and Reduction Linda Cornwal, JRA1, Brno 20 th June 2005
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Task tracking SA3 All Hands Meeting Prague.
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Standard network trouble tickets exchange.
Additional Services: Security and IPv6 David Kelsey STFC-RAL.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks UK-Ireland-France Regional Participation.
INFSO-RI SA2 ETICS2 first Review Valerio Venturi INFN Bruxelles, 3 April 2009 Infrastructure Support.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Operations Automation Team Kickoff Meeting.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Ian Bird All Activity Meeting, Sofia
Security Vulnerability Detection and reduction Linda Cornwall MWSG, CERN 24 Feb 2005
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Patch Preparation SA3 All Hands Meeting.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks MSA3.4.1 “The process document” Oliver Keeble.
Recent lessons learned: Operational Security David Kelsey CCLRC/RAL, UK GDB Meeting, BNL, 5 Sep 2006.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks NA5: Policy and International Cooperation.
INFSO-RI Enabling Grids for E-sciencE Joint Security Policy Group David Kelsey, CCLRC/RAL, UK 3 rd EGEE Project.
EGEE is a project funded by the European Union under contract IST New VO Integration Fabio Hernandez ROC Managers Workshop,
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks EGEE Operations: Evolution of the Role of.
Resource Provisioning EGI_DS WP3 consolidation workshop, CERN Fotis Karayannis, GRNET.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud and Software Vulnerabilities Linda Cornwall, STFC 20.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security aspects (based on Romain Wartel’s.
INFSO-RI Enabling Grids for E-sciencE Operational Security Coordination Team OSCT report EGEE-4, Pisa Ian Neilson, CERN.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks NA5: Policy and International Cooperation.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Astrophysical Cluster Session Claudio Vuerli,
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) gLite Grid Introduction Salma Saber Electronic.
15-Jun-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the LCG Security Group) CERN 15 June 2004 David Kelsey CCLRC/RAL, UK
EGEE-II Enabling Grids for E-sciencE EGEE and gLite are registered trademarks The Grid Security Vulnerability Group Activity in Central.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI D4.4 and the EGI review Dr Linda Cornwall 19 th Sept 2011 D4.41.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSVG issue handling summary Dr Linda Cornwall.
Grid Services Security Vulnerability and Risk Analysis
David Kelsey CCLRC/RAL, UK
EGI Security Risk Assessment
Prevention is better than Cure
Presentation transcript:

EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Services Security Vulnerability and Risk Analysis Dr Linda Cornwall RAL

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 2 Contents Why we setup the Grid Security Vulnerability Group Starting up the GSVG Initial strategy and disclosure policy Vulnerability Task in EGEE II Setup of the GSVG in EGEE II Disclosure policy in EGEE II Risk Assessments Other vulnerability related activities in EGEE II

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 3 Why we set up the Grid Security Vulnerability Group (GSVG) A lot done concerning Grid Security Functionality –Authentication, Authorization Not much being done to ask “Is the Grid Secure” We know the software isn’t perfect – Some vulnerabilities are in the process of being fixed – Some are probably waiting to be exploited It will be really embarrassing if when the Large Hadron Collider comes on line at CERN we get a serious attack which prevents data being stored or processed Hackers Conference HOPE mentioned Grids –Unfriendly people without credentials aware of us –Cannot rely on security through obscurity Real Grids are being deployed –No longer a research/proof of concept activity

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 4 Starting up the Grid Security Vulnerability Group (GSVG) Started up in 2005 with part of my time and a few “best efforts” volunteers Aim to inform developers and deployment people of vulnerabilities as they are identified and encourage them to produce fixes or to reduce their impact. –Aim to keep grids deployed, avoid incidents, improve Grid Security with time Joint effort between Large Hadron Collider Grid (LCG), UK particle Physics Grid (GridPP), and EGEE Some people were worried about the legality of not making info available to all Defined a policy and strategy for carrying out the work Got project management approval of our terms

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 5 Initial strategy and disclosure policy Log issues, set a Target Date (TD) usually 45 days If issue is still open on TD, distribute information including risk assessment to LCG security contacts –Vulnerability group does not make issues public –Security contacts considered internal Includes both software and deployment issues Issues entered by anyone –Developers enter issues they know about –Includes information from internal knowledge –Includes impact of missing functionality which will not be available in the short term

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 6 Achievements and problems Collected 84 potential issues –18 closed (8 fixed, 9 invalid/not a problem, 1 duplicate) –6 fix rolling out/ awaiting the next release –61 reports sent out to the LCG security contacts Do not see enough issues closed by TD –Not enough priority given to investigating or fixing issues –TD set to a default (problem prioritizing) –Looks worse than it is  Some issues are missing functionality  Many not directly exploitable Some people who would have been very useful in the team didn’t want to join –Despite project approval

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 7 The Vulnerability Task in EGEE II In EGEE II there is funded manpower for the “Grid Services Security Vulnerability and Risk Assessment” Task The aim is “to incrementally make the Grid more secure and thus provide better availability and sustainability of the deployed infrastructure” –This is recognition that it cannot be made perfect immediately The Grid Security Vulnerability Group (GSVG) is the largest activity in this task –Which continues to deal with specific issues

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 8 Setup of the GSVG in EGEE II The GSVG in EGEE II consists of Core Group Members –Run the general process Developers from the various development Clusters –Can confirm/check information on issues and fix issues Risk Assessment Team (RAT) –Carry out Risk Assessments RAT people are security experts, experienced system administrators, deployment experts and developers

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 9 Process of the GSVG in EGEE II Issue logged in Database –Anyone can submit an issue –Only GSVG members can read or modify –Issues can also be submitted by Issue is allocated to Risk Assessment Team (RAT) member RAT member –Checks information, –Carries out a Risk assessment 2 other RAT members also carry out Risk Assessment Target Date (TD) set according to Risk –To improve prioritizing The issue is then allocated to the appropriate developer

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 10 Disclosure Policy for EGEE II We plan to move to a responsible public disclosure policy On Target Date, information on the issue is made public –Regardless of whether a fix is available This depends on management approval, –We need to prove we can do good Risk Assessments –Agree formula for setting the TD according to Risk

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 11 Main changes A risk assessment is carried out straight after issue is entered Improved Risk Assessments Target Date is set according to Risk – By TBD formula Information to be made public on the Target Date Good Risk Assessments and setting of TD according to risk is key to making the improved process work –Which effectively prioritizes issues

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 12 Risk Assessments Currently establishing the best way to carry out Risk Assessments –Risk Assessment Team (RAT) is working on this Common Vulnerability Scoring System (CVSS) Location of issue on “Who can Exploit” “Effect” matrix Any other method RAT members propose What RAT members actually think

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 13 CVSS CVSS is the Common Vulnerability Scoring System – Takes account of various factors e.g. –Can it be exploited remotely –Access complexity  (whether it can be exploited at will or only in certain circumstances) –Authenticated or not Modifies this according to temporal factors –Availability of exploit code –Availability of fix or workaround Modifies according to the environment –This could be considered the Grid environment CVSS provides a score between 0 and 10 –Possibility of translating this to a Target Date

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 14 CVSS limitations It is designed for information systems, not Grids Does not take into account some factors important on the Grid –In particular, “who can exploit” is restricted to authenticated or not We cannot, for example, ignore that one Grid node can affect others –E.g. one sysadmin should not be able to setup a system that disrupts the Grid

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 15 Exploit/effect matrix Site security officers most fear is an attack that gives access to the whole site –Especially if it can be carried out anonymously –DOS tends to be considered no more than medium risk A vulnerability that can be exploited by an authorized user is less serious than one that can be exploited without credentials We can’t ignore the possibility that credentials may be stolen Nor can we ignore that we may have a rogue sysadmin –100s sites in 10s countries –Grid expanding globally

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 16 Matrix Root Access Local Account AuthzAuthnNo CredOther System info Local grid service Disruption Confidential DataRestricts usage for certain applications Unauthz usage Grid-wide Disrupt Impersonate Attack other systems Site Access Root Access

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 17 Risk Assessments - Contd Meeting at CERN shortly to see if we can agree a strategy + Formula for Target Dates resulting from Risk In future, possibly we will look at combining the CVSS calculation with the position on the matrix –Plus any other criteria we define

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 18 Other Vulnerability work in EGEE II Other activities currently ramping up Providing best practise guidelines for developers Co-ordinating code walkthroughs/reviews –Largely to be commissioned by the Integration, testing and Certification Task in SA3 The vulnerability task is involved in co-ordinating the specific (security) tests as part of the certification process The possibility of carrying out Ethical Hacking is being considered

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 19 Summary The GSVG is attempting to prioritize specific issues identified through risk assessments and setting Target Dates Other activities for reducing vulnerabilities –Testing –Code walkthroughs –Ethical hacking This work is important, the Grid has been described as a “Beautiful Amplifier” of vulnerability issues

Enabling Grids for E-sciencE EGEE-II INFSO-RI Grid Vulnerability - Linda Cornwall 20 Questions/Discussion