23
Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk

Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk

Embed Size (px)

Citation preview

Page 1: Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk

Grid Security Policy

David Kelsey (RAL)1 July 2009

UK HEP SYSMAN Security workshopdavid.kelsey at stfc.ac.uk

Page 2: Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk

21 Jul 2009 Kelsey, Security Policy

Overview• Why do we need security policies?• Joint Security Policy Group

– The mandate– Interoperability is important!

• Overview of JSPG policies– Some example policies

• Future plans

Page 3: Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk

31 Jul 2009 Kelsey, Security Policy

Why do we need security policies?

• Management of IT security– All about management of risks and

balancing with availability of services• Having performed a risk analysis

– Need a Security Plan• to mitigate and manage those risks

• Security Plan includes various “Controls”– Technical– Operational– Management

• Security Policy is part of Management Controls (written documents)

Page 4: Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk

4

Trust is important• Trust is a relationship of reliance. A trusted

party is presumed to seek to fulfill policies, ethical codes, law and their previous promises. (wikipedia)

• Trust is a prediction of reliance on an action, based on what a party knows about the other party. Trust is a statement about what is otherwise unknown -- for example, because it is far away, cannot be verified, or is in the future.

1 Jul 2009 Kelsey, Security Policy

Page 5: Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk

51 Jul 2009 Kelsey, Security Policy

Joint Security Policy Group• This started as a WLCG activity in 2003

– LHC Grid (CERN)– To advise GDB and Deployment Manager

• On all matters related to security

• In 2004, EGEE started– JSPG remit expanded to cover both projects– Strong participation by OSG, NDGF, …

• Revised mandate (2008)– http://www.jspg.org/– prepares and maintains security policies for its primary

stakeholders (EGEE and WLCG)– also able to provide policy advice on any security matter

• Policies approved and adopted by Grid management

Page 6: Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk

61 Jul 2009 Kelsey, Security Policy

Policy Interoperability• Wherever possible, JSPG aims to

– prepare simple and general policies– applicable to the primary stakeholders, but– also of use to other Grid infrastructures (NGI's etc)

• The adoption of common policies by multiple Grids eases the problems of interoperability (and scaling)

• Users, VOs and Sites all accept the same policies during their (single) registration (with Grid or VO)

• Other participants then know that their actions are already bound by the policies– No need for additional negotiation, registration or

agreement

Page 7: Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk

7

Interoperability (2)• User registers (once) with his/her VO

– Must accept Grid AUP

• Sites willing to delegate registration to VO knowing that VO procedures must follow same VO policy– And that User will have accepted AUP

• The use of common policies– Allow VOs to easily use resources in multiple Grids

• as move to EGI in Europe, for example

• Other Grids are welcome to use our policies– With appropriate acknowledgements!

1 Jul 2009 Kelsey, Security Policy

Page 8: Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk

8

Overview of JSPG Policies

1 Jul 2009 Kelsey, Security Policy

Page 9: Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk

91 Jul 2009 Kelsey, Security Policy

Grid Security Policy

• The main policy document• https://edms.cern.ch/document/428008/

• To fulfil its mission, it is necessary for the Grid to protect its resources. This document presents the policy regulating those activities of Grid participants related to the security of Grid services and Grid resources.

Page 10: Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk

101 Jul 2009 Kelsey, Security Policy

Grid Security Policy (2)

• Objectives– This policy gives authority for actions which may be carried

out by certain individuals and bodies and places responsibilities on all participants.

• Scope– This policy applies to all participants. Every site

participating in the Grid autonomously owns and follows their own local security policies with respect to the system administration and networking of all the resources they own, including resources which are part of the Grid. This policy augments local policies by setting out additional Grid-specific requirements.

Page 11: Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk

111 Jul 2009 Kelsey, Security Policy

Grid Security Policy (3)

• Additional Policy documents– Appendix 1 defines additional policy documents which

must exist for a proper implementation of this policy. These documents are referred to in section 2.

• Roles and Responsibilities: Participants– Grid Management– Grid Security Officer & Grid Security Operations– Virtual Organisation Management– Users– Site Management– Resource Administrators

Page 12: Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk

121 Jul 2009 Kelsey, Security Policy

Grid Security Policy (4)• Limits to Compliance

– Wherever possible, Grid policies and procedures are designed so that they may be applied uniformly across all sites and VOs. If this is not possible, for example due to legal or contractual obligations, exceptions may be made. Such exceptions must be justified in a document submitted to the Grid Security Officer for authorisation and, if required, approval at the appropriate level of management.

– In exceptional circumstances it may be necessary for participants to take emergency action in response to some unforeseen situation which may violate some aspect of this policy for the greater good of pursuing or preserving legitimate Grid objectives. If such a policy violation is necessary, the exception should be minimised, documented, time-limited and authorised at the highest level of the management commensurate with taking the emergency action promptly, and the details notified to the Grid Security Officer at the earliest opportunity.

Page 13: Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk

131 Jul 2009 Kelsey, Security Policy

Grid Security Policy (5)• Sanctions, Liability, Disputes and

Intellectual Property Rights– Sites or resource administrators who fail to comply with

this policy in respect of a service they are operating may lose the right to have that service instance recognised by the Grid until compliance has been satisfactorily demonstrated again.

– Users who fail to comply with this policy may lose their right of access to and/or collaboration with the Grid, and may have their activities reported to their home institute or, if those activities are thought to be illegal, to appropriate law enforcement agencies.

– VOs which fail to comply with this policy, together with all the users whose rights with respect to the Grid derives from that VO, may lose their right of access to and/or collaboration with the Grid.

– The issues of liability, dispute resolution and intellectual property rights, all of which may be Grid-specific, should be addressed in the additional policy documents.

Page 14: Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk

141 Jul 2009 Kelsey, Security Policy

Security Policy

Site & VOPolicies

Certification Authorities

Traceability and Logging

SecurityIncident Response

Accounting DataPrivacy

Pilot Jobs and VO Portals

Grid & VOAUPs

JSPG Security Policies

Page 15: Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk

151 Jul 2009 Kelsey, Security Policy

Sites Operations Policy

• Accepted and signed by authorized person during registration of Site with the Grid

• https://edms.cern.ch/document/819783

Page 16: Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk

161 Jul 2009 Kelsey, Security Policy

VO Operations Policy

• Accepted and signed by authorized person during registration of VO with the Grid

• https://edms.cern.ch/document/853968

Page 17: Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk

171 Jul 2009 Kelsey, Security Policy

Grid AUP

• Acceptable Use Policy• Accepted by User

• during registration with VO

• https://edms.cern.ch/document/428036

Page 18: Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk

181 Jul 2009 Kelsey, Security Policy

Current JSPG workTwo revised policies awaiting formal approval and adoption• Virtual Organisation Registration Security Policyhttps://edms.cern.ch/document/573348/8http://www.jspg.org/wiki/VO_Registration_Policy

• Virtual Organisation Membership Management Policyhttps://edms.cern.ch/document/428034/3http://www.jspg.org/wiki/VO_Membership_Management_Policy

Three new policies are in “final call”• Grid Policy on the Handling of User-Level Job Accounting

Data• VO Portal Policy• Security Incident Response Policy

Page 19: Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk

191 Jul 2009 Kelsey, Security Policy

Future JSPG plans• Revise the Grid User AUP

– Some Grids use it but have modified our text– Explore why and standardise where possible

• DEISA, TeraGrid, EU infrastructures, national Grids, …

• Revise policy framework during next 6 months– More simple, general and consistent– More applicable to EGI world– Broaden the membership – include more NGIs and other

Grids

• Other Grids, volunteers and interested parties welcome

Page 20: Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk

201 Jul 2009 Kelsey, Security Policy

JSPG Meetings, Web etc• Meetings - Agenda, presentations, minutes etchttp://indico.cern.ch/categoryDisplay.py?categId=68• JSPG Web siteshttp://www.jspg.org andhttp://proj-lcg-security.web.cern.ch/• Membership of the JSPG mail list is closed, BUT

– Volunteers to work with us are always welcome!

• Policy documents at http://www.jspg.org andhttp://proj-lcg-security.web.cern.ch/proj-lcg-

security/documents.html

Page 21: Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk

211 Jul 2009 Kelsey, Security Policy

Where are JSPG security policies?

• http://www.jspg.org/wiki/JSPG_Docs• http://proj-lcg-security.web.cern.ch/proj-

lcg-security/documents.html• https://edms.cern.ch/nav/CERN-

0000022711

Page 22: Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk

221 Jul 2009 Kelsey, Security Policy

Security Policies adopted by EGEE and GridPP?

• http://osct.web.cern.ch/osct/policies.html

• http://www.gridpp.ac.uk/deployment/security/policies/index.html

Page 23: Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk

1 Jul 2009 Kelsey, Security Policy

Discussion