Www.egi.eu EGI-InSPIRE RI-261323 EGI www.egi.eu EGI-InSPIRE RI-261323 Service Operations Security Policy the new generalised site operations security policy.

Slides:



Advertisements
Similar presentations
Reference Document Management 1 European Railway Agency (ERA) Cross-Acceptance Unit P. Mihm 17/11/2010.
Advertisements

EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI GGUS user authentication Tiziana Ferrari/EGI.eu Peter Solagna/EGI.eu
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI - Identity Management Steven Newhouse Director, EGI.eu Federated Identity.
Grid Security Users, VOs, Sites OSG Collaboration Meeting University of Washington Bob Cowles August 23, 2006 Work supported.
SOX and IT Audit Programs John R. Robles Thursday, May 31, Tel:
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Security Policy Group Summary EGI TF David Kelsey 6/28/
Network security policy: best practices
Key changes and transition process
Key changes from OHSAS 18001:1999
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
Lisa Wood, CISA, CBRM, CBRA Compliance Auditor, Cyber Security
EGI: A European Distributed Computing Infrastructure Steven Newhouse Interim EGI.eu Director.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
INFSO-RI Enabling Grids for E-sciencE Incident Response Policies and Procedures Carlos Fuentes
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Security Policy Group EGI Technical Forum Sep 2010 David Kelsey.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Future support of EGI services Tiziana Ferrari/EGI.eu Future support of EGI.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
Security Update WLCG GDB CERN, 12 June 2013 David Kelsey STFC/RAL.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud F2F Security Issues in the cloud Introduction Linda Cornwall,
Responsibilities of ROC and CIC in EGEE infrastructure A.Kryukov, SINP MSU, CIC Manager Yu.Lazin, IHEP, ROC Manager
Security Policy Update LCG GDB Prague, 4 Apr 2007 David Kelsey CCLRC/RAL
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
9-Sep-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security (Report from the LCG Security Group) CERN, 9 September 2003 David Kelsey CCLRC/RAL, UK
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks EGEE and OSG: Common Security Policies? OSG.
Grid Operations Centre LCG SLAs and Site Audits Trevor Daniels, John Gordon GDB 8 Mar 2004.
9-Oct-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security (Report from the LCG Security Group) FNAL 9 October 2003 David Kelsey CCLRC/RAL, UK
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
INFSO-RI Enabling Grids for E-sciencE EGEE SA1 in EGEE-II – Overview Ian Bird IT Department CERN, Switzerland EGEE.
Security Policy Update David Kelsey UK HEP Sysman, RAL 1 Jul 2011.
EGI-InSPIRE RI EGI.eu European Grid Infrastructure EGI-InSPIRE RI Credential Validation Middleware Requests compiling.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks EGI Operations Tiziana Ferrari EGEE User.
A Trust Framework for Security Collaboration among Infrastructures David Kelsey (STFC-RAL, UK) WLCG GDB, CERN 10 Jul 2013.
Security Policy: From EGEE to EGI David Kelsey (STFC-RAL) 21 Sep 2009 EGEE’09, Barcelona david.kelsey at stfc.ac.uk.
June 6, 2006OSG - Draft VO AUP1 Open Science Grid Trust as a Foundation June 6, 2006 Keith Chadwick.
State of Georgia Release Management Training
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI SPG future work EGI Technical Forum Lyon, 21 Sep 2011 David Kelsey, STFC/RAL.
EGI-InSPIRE RI EGI EGI-InSPIRE RI Establishing Identity in EGI the authentication trust fabric of the IGTF and EUGridPMA.
JSPG Update David Kelsey MWSG, Zurich 31 Mar 2009.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Grid Oversight in Service Level Agreement environment Małgorzata Krakowian,
Security Policy Update WLCG GDB CERN, 8 Dec 2010 David Kelsey STFC/RAL david.kelsey AT stfc.ac.uk.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI IGTF EUGridPMA status update SHA-2, OCSP, and more David.
Why a Commercial Provider should Join the Academic Cloud Federation David Blundell Managing Director 100 Percent IT Ltd Simple, Flexible, Reliable.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Draft Security Virtualisation Policy (for Romain Wartel – CERN) EGI Technical.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Policy Development in EGI.eu/EGI-InSPIRE Damir Marinovic (EGI.eu)
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI CSIRT Procedure for Compromised Certificates and Central Security Emergency.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI VOMS Proxy Lifetime UCB 21 Aug 2012 David Kelsey STFC.
1 The WTO Agreement on Technical Barriers to Trade Basic Concepts and Member Obligations.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud and Software Vulnerabilities Linda Cornwall, STFC 20.
EGI-InSPIRE RI SPG Tasks for Year 2011 Jan 2011 Kelsey/Security Policy Group1.
EGI-InSPIRE RI SPG Tasks for Year 2011 Jan 2011 Kelsey/Security Policy Group1.
EGI Process Assessment and Improvement Plan – EGI core services – Tiziana Ferrari FedSM project 1EGI Process Assessment and Improvement Plan (Core Services)
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Questionnaires to Cloud technology providers and sites Linda Cornwall, STFC,
Grid Security Policy: EGEE to EGI David Kelsey (RAL) 16 Sep 2009 JSPG meeting, DFN Berlin david.kelsey at stfc.ac.uk.
15-Jun-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the LCG Security Group) CERN 15 June 2004 David Kelsey CCLRC/RAL, UK
Cloud Security Session: Introduction 25 Sep 2014Cloud Security, Kelsey1 David Kelsey (STFC-RAL) EGI-Geant Symposium Amsterdam 25 Sep 2014.
Security Policy Update WLCG GDB CERN, 11 June 2008 David Kelsey STFC/RAL
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI D4.4 and the EGI review Dr Linda Cornwall 19 th Sept 2011 D4.41.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI SVG F2F Virtual Machines VM images, software run on VMS. 3 rd March 2015.
Open Science Grid Consortium Meeting
Integrated Management System and Certification
Ian Bird GDB Meeting CERN 9 September 2003
Nordic ROC Organization
Outcome TFCS-11// February Washington DC
Registration Decision Criteria
Outcome TFCS-11// February Washington DC
Alignment of Part 4B with ISAE 3000
Updated (VO) Community Security Policies
Update - Security Policies
Review of the 1958 Agreement
Presentation transcript:

EGI-InSPIRE RI EGI EGI-InSPIRE RI Service Operations Security Policy the new generalised site operations security policy David Groep, FOM-Nikhef and NL-NGI for EGI global task O-E-15 This work is supported by EGI-InSPIRE under NA2

EGI-InSPIRE RI Current (old) policy Once upon a time: the Grid Site Operations Policy targeted at sites, being the only providers of resources and services mixed security and operational policy with a few procedures thrown in part of the security policy framework, but with an explicit request for the Grid to ensure compliance by authorized signatories to the agreement Establishing identity in EGI2

EGI-InSPIRE RI Service Security aims New deployment models inspired an integrated security policy for any kind of service Generalised policy for services Address both physical and virtual systems & sites Target resource providers, VM managers, VO operators Align with EGI Terminology But exclude Operational items without security implication Procedures and technical non-security bits And still try to keep it short & sweet Establishing identity in EGI3

EGI-InSPIRE RI Approval Process Drafted by a small Editorial Team Discussed widely in Security Policy Group (SPG) with the NGI representatives and invited experts Circulated for Public Comment in June to all NGIs, OMB, and operational bodies Few questions received (mainly text clarifications) – have been addressed in the final version So, what does the new security policy comprise? Establishing identity in EGI4

EGI-InSPIRE RI Preamble This policy is one of a set of documents hat together define the Security Policy [R1]. This individual document must be considered in conjunction with all the policy documents in the set Establishing identity in EGI5

EGI-InSPIRE RI Service Ops Security Policy By running a Service on the IT Infrastructure, by providing a service that is part of the IT Infrastructure, or retaining state that is related to the IT Infrastructure, either provided as an independent service or hosted in a Resource Centre, You agree to the conditions laid down in this document and other referenced documents, which may be revised from time to time. 1.You shall provide and maintain accurate contact information to the Infrastructure Organisation and any Resource Centres involved, including but not limited to at least one Security Contact who shall respond to enquiries in a timely fashion. 2.You shall comply with all security policies and procedures of the Infrastructure Organisation and of any Resources Centres involved in operating Your service Establishing identity in EGI6

EGI-InSPIRE RI Service Ops Security Policy 3.You are held responsible by the Infrastructure Organisation and by any Resource Centres involved for the safe and secure operation of the Service. You shall not mislead Users regarding the suitability of a Service for their needs, nor mislead the IT Infrastructure, Infrastructure Organisation, or any Resource Centres involved about your Service. The Service shall not be detrimental to the IT Infrastructure and any Resource Centres involved. 4.You should follow IT security best practices that include pro- actively applying software patches, updates or configuration changes related to security. When notified by the Infrastructure Organisation or any Resource Centres involved of software patches, updates or configuration changes required for security, You shall apply these to your services within the specified time period Establishing identity in EGI7

EGI-InSPIRE RI Service Ops Security Policy 5.You shall collect and retain sufficient auditing information as defined in the Tracability and Logging Policy and procedures, and must assist the Infrastructure Organisation and any Resource Centres involved in security incident response. 6.You shall use logged information, including information provided to you by Users, other Resource Centres, Service operations or by the Infrastructure Organisation, only for administrative, operational, accounting, monitoring and security purposes. You shall apply due diligence in maintaining the confidentiality of logged information. 7.Your provisioning of Services shall not in itself create any intellectual property rights in software, information and data provided to your Service or in data generated by your Service Establishing identity in EGI8

EGI-InSPIRE RI Service Ops Security Policy 8.Provisioning of Services is at your own risk. Any software provided by the Infrastructure Organisation is provided on an as-is basis only, and subject to its own license conditions. There is no guarantee that any procedure applied by the Infrastructure Organisation is correct or sufficient for any particular purpose. The Infrastructure Organisation and other Resource Centres acting as service hosting providers are not liable for any loss or damage in connection with your participation in the IT Infrastructure. 9.You may control access to Your Service for administrative, operational and security purposes and shall inform the affected users if you limit or suspend their access. You shall comply with all relevant incident response procedures regarding the notification of security incidents Establishing identity in EGI9

EGI-InSPIRE RI Service Ops Security Policy 10.The Infrastructure Organisation and any Resources Centres involved may control your access to the IT Infrastructure or Resource Centres for administrative, operational and security purposes if you fail to comply with these conditions Establishing identity in EGI10