Sponsored by the National Science Foundation GENI Cloud Security GENI Engineering Conference 12 Kansas City, MO Stephen Schwab University of Southern California / ISI 3 Nov
Sponsored by the National Science Foundation 2 03 Nov 2010 GENI Cloud Architecture Is this an opportunity to extend the way the GENI CF/AM architecture is presented? Why is a GENI Cloud different from the other GENI Aggregates? - Allocation of many nodes? - Many VMs? - Data Intensive? - Longevity of Slices?
Sponsored by the National Science Foundation 3 03 Nov 2010 GENI (Component) Authentication Authentication, Node Login, SSH Keys –Default mechanisms deployed because they are inherited –Node Login – automation required for scale –SSH Keys – coupled to the ssh login mechanism Can or should we re-architect authentication, node login, and key management for GENI Clouds? –Major engineering and user education challenge –Convenience –Is the use model for the GENI Cloud qualitatively different from the use model for other slices?
Sponsored by the National Science Foundation 4 03 Nov 2010 GENI Authorization Mechanisms and Policy Security Architecture Properties enabled through a principled approach: –Support for Authorization “At-scale” decentralized, multiple distinct roots-of-trust, etc. –Reasoning about Security Policies predictable impact of changes –Auditing forensics: why was an action permitted? confidence building: GENI community has the means to answer these questions if and when the need arises –GENI Resource Contributors retain control enables local policies over who access what support sub-communities that need to share resources
Sponsored by the National Science Foundation 5 03 Nov 2010 ABAC Review Attribute-based Access Control (ABAC) Decides whether to grant or deny requests based on a collection of credentials –Defining the rights/privileges of the requesting user –Defining the policy of the resource provider On-going work in the GENI Authorization arena –Development of libabac and tools in TIED –Integration/Prototyping in three CFs –Decision on adoption for GENI pending at GEC-13
Sponsored by the National Science Foundation 6 03 Nov 2010 ABAC Details Refer to Ted Faber’s talk from the GEC-12 Authorization Session for ABAC Details Refer to the TIED project page on the wiki for documentation and software (libabac)
Sponsored by the National Science Foundation 7 03 Nov 2010 Implicit Attributes for Cloud Security Security policies could consider all known information such as: –Location: What machine/network/IP address is making a request? –Temporal Context: What actions or other requests were made? –Computational Information Flow Context: What computations (e.g. search/queries) over what data sources produced intermediate or final results –Trust posture: What hardware/software, Virtual Machine/GuestOS/Cloud Infrastructure Stack is being used? ABAC policies can rely on attributes in a general way –Can and should we use the power of implicit attributes to protect GENI Clouds?