Download presentation
Presentation is loading. Please wait.
Published byJohn Blankenship Modified over 7 years ago
1
Security Management Geant SIG-SIM – Alf Moens
Security management in Norway – Rolf Sture Normann Security management at DEIC – Henrik Larsen Nordunet Helsinki
2
SIG Information Security Management & WISE
Alf Moens
3
Whoami Corporate security officer SURF Board member SCIPR
Chair SIG-ISM Board member WISE Member Géant Community Committee ICT and security background with strong interest in privacy Board member Dutch Platform for security professionals Master Information Security Management (MISM, 2007) Meer over security management process Describe details And add pdca , describe the components
4
GÉANT GÉANT is the leading collaboration on network and related infrastructure and services for the benefit of research and education an EC trusted partner for many years, as the coordinator of network projects co-funded by the European Union (EU). a member organisation with NRENs as members Research projects: GN4 Network archtecture Network services Trust and identity Collaboration projects Several SIGs and taskforces; MSP: NREN service delivery Marcom NOC TF-CSIRT SIG-ISM TF-Storage Spin offs REFEDS WAT IS GEANT, WAAROM, WELKE SIGS
5
The security landscape
Organisation, governance, roles and responsibilities, policy Incident detection, prevention and respons Monitoring of infrastructure and suppliers Risk management, security measures Awareness and training Assessments, Audit Describe how these communities reinforce each other
6
Who is doing what in the security landscape?
Describe how these communities reinforce each other
7
national communities Géant SIG-ISM WISE TF-CSIRT CEO Forum SIG-ISM
NREN CERT ???? Describe how these communities reinforce each other
8
Competing or collaborating?
Organisation, governance, roles and responsibilities, policy SIG-ISM / WISE / CEO Forum Incident detection, prevention and respons Monitoring of infrastructure and suppliers Risk management, security measures Awareness and training TF-CSIRT NREN-CERT national communities Assessments, Audit Describe how these communities reinforce each other
9
WISE – security for e-infrastructures
WISE is for the e-infrastructures, globally, both networking and super- and gridcomputing infrastructures. WISE was initiated by Géant SIG-ISM and SCI. SIG-ISM: Information Security Management SCI: Security for Collaboration among Infrastructures “Launching” e-infrastructures: Géant (European research and education networks) EGI (European Grid Infrastructure) EUDAT (research data services) PRACE (high performance computing) Participating communities NRENs, HEP/CERN, the Human Brain Project, XSEDE, NCSA, CTSC, LIGO and others Kick off meeting at BSC, Barcelona, oktober 2015, 49 participants Workshops at XSEDE and DI4R in 2016
10
WISE working program 2016 Updating the SCI-framework: an operational security framework with guidance for incident response, changes, user management Security Training and Awareness: what training do you need, what is available Risk Assessment: Looking at the major risks on information security for an e-infrastructure Security Review and Audit: Can we set up a program of peer reviewing? What should you audit and when? Security in Big and Open Data: Identifying the security needs for big and open data
11
SIG ISM Géant SIG ISM Aimed at security officers Getting in control
Information Security Management Incident management seen as part of security management Purpose - Trust, on what basis? - To certify or not to certify? Whitepapers information security management Risk management 2016: Expand the community Establish a Risk Register How to implement security management Anually
12
Artwork: Rolf Sture Normann
13
SIG ISM is looking at NREN needs
Strong CERTs/CSIRTs Trust Some are ISO certified or are working on it: Because they are a tld registry Because they deliver services to government Internal motivation: goals for quality management With SIG-ISM we are joining forces on the subject of trust
14
Whitepaper on Security Management
High level paper on how to organise information security in you organisation Role and responsibilities Selecting standards Full paper at:
15
Whitepaper on Risk Management
High level paper on the setting up and maintaining a risk management proces for an NREN. Paper in draft, publicly available in september 2016 Abouth organisation and methods for establishing a risk register aimed at controlling risk and taken the right measures.
16
Designing the Risk Matrix
SIG ISM worked on 3 subjects of the Risk Matrix in her february workshop in Copenhagen Risks concerning hosted services Risks concerning People Risks concerning federated identity management systems First steps to a comprehensive risk matrix for an NREN Cooperate with WISE WG-SRA
17
Outcome Copenhagen Workshop (work in progress)
Hosted Services infrastructure complexity insecure software or infrastructures supplier incident detection trust/over-delegation People Economical loss/reputation Sickness Leaving staff Segregation of duties Policies Screening (lack of) Federations Declining (implicit) trust in growing federations Federation operator procedures and responsibilities Users cannot log in Cannot identify abuser/intruder Leak/abuse of personal information SP Data/Attribute profiles appropriate Protocol implementation vulnerabilities
18
Results of the September 2016 Trondheim Workshop
Write up success stories: What works, what doesn’t work Business case for security management: when is security a success? Share information and documentation Expand the risk register Tooling for security and risk management, and for secure sharing of information Set up a directory of key people with a short description (2-pager) of what they are doing and how Set up a FAQ Survey on ISM Trondheim
19
Competing or collaborating?
Organisation, governance, roles and responsibilities, policy SIG-ISM / WISE / CEO Forum Incident detection, prevention and respons Monitoring of infrastructure and suppliers Risk management, security measures Awareness and training TF-CSIRT NREN-CERT national communities Assessments, Audit Describe how these communities reinforce each other
20
Allways be prepared For your next incident
21
From incident handling to security management
Key Largo
22
Alf Moens Foto’s: Alf Moens
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.