Update on Security Policy
David Kelsey (RAL) 7 Mar 2010
Security Workshop @ ISGC 2010, Taipei david.kelsey at stfc.ac.uk
Update on Security Policy David Kelsey (RAL) 7 Mar 2010 Security - - PowerPoint PPT Presentation
Update on Security Policy David Kelsey (RAL) 7 Mar 2010 Security Workshop @ ISGC 2010, Taipei david.kelsey at stfc.ac.uk Overview Why do we need security policies? Joint Security Policy Group (JSPG) Some history
Security Workshop @ ISGC 2010, Taipei david.kelsey at stfc.ac.uk
2 7 Mar 2010 Kelsey, Security Policy
3 7 Mar 2010 Kelsey, Security Policy
4
7 Mar 2010 Kelsey, Security Policy
5 7 Mar 2010 Kelsey, Security Policy
– JSPG remit expanded to cover both projects – Strong participation by OSG, NDGF, …
– http://www.jspg.org/ – prepares and maintains security policies for its primary stakeholders (EGEE and WLCG) – also able to provide policy advice on any security matter
6 7 Mar 2010 Kelsey, Security Policy
– prepare simple and general policies – applicable to the primary stakeholders, but – also of use to other Grid infrastructures (NGI's etc)
– No need for additional negotiation, registration or agreement
7
7 Mar 2010 Kelsey, Security Policy
8 7 Mar 2010 Kelsey, Security Policy
9 7 Mar 2010 Kelsey, Security Policy
– gives authority for actions
– places responsibilities on all participants
– This policy applies to all participants – Every site participating in the Grid autonomously owns and follows their own local security policies – This policy augments local policies by setting out additional Grid-specific requirements.
10 7 Mar 2010 Kelsey, Security Policy
– Appendix 1 defines additional policy documents – These must exist for a proper implementation of this policy
– Grid Management – Grid Security Offjcer & Grid Security Operations – Virtual Organisation Management – Users – Site Management – Resource Administrators
11 7 Mar 2010 Kelsey, Security Policy
– Grid policies designed to be applied uniformly across all sites and VOs – exceptions may be made when required – must be justified in a document submitted to the Grid Security Offjcer for authorisation – In exceptional circumstances it may be necessary for emergency action – the exception should be minimised, documented, time- limited and authorised at the highest level of the management commensurate with taking the emergency action promptly, and the details notified to the Grid Security Offjcer at the earliest opportunity
12 7 Mar 2010 Kelsey, Security Policy
– Sites or resource administrators who fail to comply may lose the right to have that service instance recognised by the Grid – Users who fail to comply may lose their right of access to and/or collaboration with the Grid
– VOs which fail to comply may lose their right of access to and/or collaboration with the Grid
13 7 Mar 2010 Kelsey, Security Policy
14 7 Mar 2010 Kelsey, Security Policy
era)
– revise all policy documents to make simpler and more general
Policies approved and adopted during the last year…
https://edms.cern.ch/document/573348/8
https://edms.cern.ch/document/428034/3
Data
https://edms.cern.ch/document/855382/5
https://edms.cern.ch/document/972973/6
https://edms.cern.ch/document/428035/7
15
7 Mar 2010 Kelsey, Security Policy
16
7 Mar 2010 Kelsey, Security Policy
17
Site_Registration_Security_Policy – Version 3.1
– contains many detailed registration procedures
– change the focus of the document to be purely related to security policy issues – similar to the recently approved "Virtual Organisation Registration Security Policy“
7 Mar 2010 Kelsey, Security Policy
18
7 Mar 2010 Kelsey, Security Policy
19
7 Mar 2010 Kelsey, Security Policy
20
– aimed at managing cross-Grid operational security risks
Grids
– But Grids can use template policies if they wish
– Taking high-level view to identify those components which are necessary
7 Mar 2010 Kelsey, Security Policy
21
security policy
requirements – Standards should come later
7 Mar 2010 Kelsey, Security Policy
7 Mar 2010
Infrastructur e
Includes
Operations
Users
Includes
Communities
Providers
Includes
Providers
Providers, e.g. VO running services
7 Mar 2010
Infrastructur e
Includes
Response
Handling
Users
Includes
Management
response
Providers
Includes
Response
7 Mar 2010
Infrastructur e Users Providers Incident Response Traceability Data Protection
25
– And produce template policies
7 Mar 2010 Kelsey, Security Policy
26 7 Mar 2010 Kelsey, Security Policy
http://indico.cern.ch/categoryDisplay.py?categId=68
http://www.jspg.org and http://proj-lcg-security.web.cern.ch/
– Volunteers to work with us are always welcome!
http://proj-lcg-security.web.cern.ch/proj-lcg-security/ documents.html
27 7 Mar 2010 Kelsey, Security Policy
7 Mar 2010 Kelsey, Security Policy