update on security policy
play

Update on Security Policy David Kelsey (RAL) 7 Mar 2010 Security - PowerPoint PPT Presentation

Update on Security Policy David Kelsey (RAL) 7 Mar 2010 Security Workshop @ ISGC 2010, Taipei david.kelsey at stfc.ac.uk Overview Why do we need security policies? Joint Security Policy Group (JSPG) Some history


  1. Update on Security Policy David Kelsey (RAL) 
 7 Mar 2010 
 Security Workshop @ ISGC 2010, Taipei david.kelsey at stfc.ac.uk

  2. Overview • Why do we need security policies? • Joint Security Policy Group (JSPG) – Some history – Interoperability • Overview of JSPG policies – Current status and recent work • The transition to EGI Kelsey, Security Policy 7 Mar 2010 2

  3. Why do we need security policies? • Management of IT security – Management of risk, balanced with availability of services • Perform a risk analysis – Need a Security Plan • to mitigate and manage the risks • Security Plan includes various “Controls” – Technical – Operational – Management • Security Policy is part of Management Controls (written documents) Kelsey, Security Policy 7 Mar 2010 3

  4. Trust is important • Trust is a relationship of reliance. A trusted party is presumed to seek to fulfill policies, ethical codes, law and their previous promises. (wikipedia) • Trust is a prediction of reliance on an action, based on what a party knows about the other party. Trust is a statement about what is otherwise unknown -- for example, because it is far away, cannot be verified, or is in the future. Kelsey, Security Policy 7 Mar 2010 4

  5. Joint Security Policy Group • This started as a WLCG activity in 2003 • In 2004, EGEE phase 1 started – JSPG remit expanded to cover both projects – Strong participation by OSG, NDGF, … • Revised mandate (2008) – http://www.jspg.org/ – prepares and maintains security policies for its primary stakeholders (EGEE and WLCG) – also able to provide policy advice on any security matter • Policies approved and adopted by Grid management • Now taking forward into EGI era (more later) Kelsey, Security Policy 7 Mar 2010 5

  6. Policy Interoperability • Wherever possible, JSPG aims to – prepare simple and general policies – applicable to the primary stakeholders, but – also of use to other Grid infrastructures (NGI's etc) • The adoption of common policies by multiple Grids eases the problems of interoperability (and scaling) • Users, VOs and Sites all accept the same policies during their (single) registration (with Grid or VO) • Other participants then know that their actions are already bound by the policies – No need for additional negotiation, registration or Kelsey, Security Policy 7 Mar 2010 6 agreement

  7. Overview of JSPG Policies Kelsey, Security Policy 7 Mar 2010 7

  8. Grid Security Policy • The main policy document • https://edms.cern.ch/document/ 428008/ • “…policy regulating those activities of Grid participants related to the security of Grid services and Grid resources.” Kelsey, Security Policy 7 Mar 2010 8

  9. Grid Security Policy (2) • Objectives – gives authority for actions • may be carried out by certain individuals and bodies – places responsibilities on all participants • Scope – This policy applies to all participants – Every site participating in the Grid autonomously owns and follows their own local security policies – This policy augments local policies by setting out additional Grid-specific requirements. Kelsey, Security Policy 7 Mar 2010 9

  10. Grid Security Policy (3) • Additional Policy documents – Appendix 1 defines additional policy documents – These must exist for a proper implementation of this policy • Roles and Responsibilities: Participants – Grid Management – Grid Security O ffj cer & Grid Security Operations – Virtual Organisation Management – Users – Site Management – Resource Administrators Kelsey, Security Policy 7 Mar 2010 10

  11. Grid Security Policy (4) • Limits to Compliance – Grid policies designed to be applied uniformly across all sites and VOs – exceptions may be made when required – must be justified in a document submitted to the Grid Security O ffj cer for authorisation – In exceptional circumstances it may be necessary for emergency action – the exception should be minimised, documented, time- limited and authorised at the highest level of the management commensurate with taking the emergency action promptly, and the details notified to the Grid Security O ffj cer at the earliest opportunity Kelsey, Security Policy 7 Mar 2010 11

  12. Grid Security Policy (5) • Sanctions – Sites or resource administrators who fail to comply may lose the right to have that service instance recognised by the Grid – Users who fail to comply may lose their right of access to and/or collaboration with the Grid • may be reported to their home institute • Or to appropriate law enforcement agencies – VOs which fail to comply may lose their right of access to and/or collaboration with the Grid • Including all their users Kelsey, Security Policy 7 Mar 2010 12

  13. JSPG Security Policies Security Incident Certification Traceability and 
 Response Authorities Logging Security Site & VO Grid & VO Policy Policies AUPs Pilot Jobs and 
 Accounting Data 
 VO Portals Privacy Kelsey, Security Policy 7 Mar 2010 13

  14. Recent JSPG work • JSPG membership expanded to include more NGIs (-> EGI era) – revise all policy documents to make simpler and more general Policies approved and adopted during the last year… • Virtual Organisation Registration Security Policy https://edms.cern.ch/document/573348/8 • Virtual Organisation Membership Management Policy https://edms.cern.ch/document/428034/3 • Grid Policy on the Handling of User-Level Job Accounting Data https://edms.cern.ch/document/855382/5 • VO Portal Policy https://edms.cern.ch/document/972973/6 • Security Incident Response Policy https://edms.cern.ch/document/428035/7 Kelsey, Security Policy 7 Mar 2010 14

  15. Revision to Grid AUP • http://www.jspg.org/wiki/ Grid_Acceptable_Use_Policy – Version 4.1 • Old policy document (V3.1 28 Oct 2005) – one of the early successes of JSPG – a simple common policy for use on several di fg erent interoperating Grids – AUP has to be accepted by all users during their (re)registration with their VO – Important for interoperation between Grids Kelsey, Security Policy 7 Mar 2010 15

  16. Grid AUP (2) • Many Grids and other computing infrastructures, e.g. DEISA, have since used this AUP • but needed to make small modifications • main aim of this revision – take these modifications into account – produce a new version to meet the needs of Grids using the policy Kelsey, Security Policy 7 Mar 2010 16

  17. Revision to Site Registration • http://www.jspg.org/wiki/ Site_Registration_Security_Policy – Version 3.1 • Old policy document (V2.0 16 Mar 2006) – contains many detailed registration procedures • These are too EGEE-specific • JSPG decided to remove these – change the focus of the document to be purely related to security policy issues – similar to the recently approved "Virtual Organisation Registration Security Policy“ • new document is now much shorter and simpler Kelsey, Security Policy 7 Mar 2010 17

  18. From EGEE to EGI Kelsey, Security Policy 7 Mar 2010 18

  19. Problems with current Policies • The complete revision during EGEE-III has been successful, however… • Still many di fg erent documents – Overlaps and inconsistencies • Includes operational issues as well as security-related issues • Participants find it di ffj cult to know which policy applies to them • Many policies are rather EGEE-specific Kelsey, Security Policy 7 Mar 2010 19

  20. Policy framework for EGI 
 - defining policy standards • A framework to enable interoperation of collaborating Grids – aimed at managing cross-Grid operational security risks • Identify policy components needed for trust between Grids • Not necessarily imposing a single policy for all – But Grids can use template policies if they wish • Presents the current set of JSPG policies – Taking high-level view to identify those components which are necessary • Other components are either too EGEE-specific or are operational rather than related to security – separate them Kelsey, Security Policy 7 Mar 2010 20

  21. Framework (2) • Specifies the issues that need to be addressed in a Grid's security policy • At this stage does not define minimum standards or requirements – Standards should come later Kelsey, Security Policy 7 Mar 2010 21

  22. Policy Framework: Participants Infrastructur Users Providers e Includes Includes • Grid users • Grid Sites Includes • VOs • Resource • Grid • Application Providers Operations Communities • Service • Security O ffj cer Providers, e.g. • Sec Operations VO running services 7 Mar 2010

  23. Policy Components Infrastructur Users Providers e Includes Includes • AUP • Traceability Includes • Traceability • Incident • Incident • VO Response Response Management • Access control • Vulnerability • Data protection • Registration Handling • Incident • etc • Patching response • Data protection • Registration • Registration • etc • etc 7 Mar 2010

  24. Security Policy Framework Infrastructur Users Providers e Incident Response 1 2 3 Traceability 4 5 6 Data Protection 7 8 9 etc etc etc 7 Mar 2010

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend