36
Security Services Lifecycle Management in On-Demand Infrastructure Services Provisioning Yuri Demchenko System and Network Engineering Group University of Amsterdam CPSRT 2010 Workshop 2 December 2010 CloudCom2010 Conference 30 October - 3 December 2010, Indianapolis

Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

Embed Size (px)

Citation preview

Page 1: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

Security Services Lifecycle Management in

On-Demand Infrastructure Services Provisioning

Yuri DemchenkoSystem and Network Engineering Group

University of Amsterdam

CPSRT 2010 Workshop2 December 2010

CloudCom2010 Conference 30 October - 3 December 2010, Indianapolis

Page 2: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

Outline

• Background for this research • On-Demand Infrastructure Services Provisioning and Composable

Services Architecture (CSA) CSA Service Delivery Framework and Services Lifecycle Management

• Proposed Security Services Lifecycle Management and related security mechanisms

• Implementation – GAAA Toolkit and Security sessions management• Summary and Discussion

CPSRT2010 Workshop, 2 December 2010 Security Services Lifecycle Management Slide_2

Page 3: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

Background to this research

• Current projects GEANT3 JRA3 Composable Services

– European NREN infrastructure GEYSERS – On-demand Optical + IT infrastructure resources provisioning

– Wide participation from large European network (Telefonika, Alcatel-Lucent, Interoute) and application providers (SAP)

• Past projects EGEE Grid Security middleware – gLite Java Authorisation Framework Phosphorus project Security architecture for multi-domain Network Resource

Provisioning– GAAA-NRP and XACML-NRP profile– Multidomain Network Resource Provisioning (NRP) model and workflow

CPSRT2010 Workshop, 2 December 2010 Security Services Lifecycle Management Slide_3

Page 4: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

Use Case – e-Science infrastructure

Components of the typical e-Science infrastructure involving multidomain and multi-tier Grid and Cloud resources and network infrastructure

CPSRT2010 Workshop, 2 December 2010 Security Services Lifecycle Management Slide_4

Initial effort to build –estimated 2 Yrs

Outsource to current telcoprovider – approx. 2 months

Target with new business model – 2 hrs

User P

User K

User A

Instrument (Manufactoring)

Visualisation

Visualisation

Grid Center

Grid Center

Computing Cloud Cloud

Storage

Grid Storage T1

Grid Storage T0

Grid Storage T1

Permanent link High Speed link provisioned on demand Link provisioned on-demand

Control & Monitoring

Page 5: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

Use Case – e-Science infrastructure

Components of the typical e-Science infrastructure involving multidomain and multi-tier Grid and Cloud resources and network infrastructure

CPSRT2010 Workshop, 2 December 2010 Security Services Lifecycle Management Slide_5

User P

User K

User A

Instrument (Manufactoring)

Visualisation

Visualisation

Grid Center

Grid Center

Computing Cloud Cloud

Storage

Grid Storage T1

Grid Storage T0

Grid Storage T1

Permanent link High Speed link provisioned on demand Link provisioned on-demand

Control & Monitoring On-demand infrastructure

services provisioning environment

• Security along the whole provisioning process and service/infrastructure lifecycle

• Manageable/user controlled security

• Securing remote executing environment

• Security context/session management

Page 6: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

GEYSERS Reference Model for Infrastructure Virtualisation

Roles:• VIO – Virtual

Infrastructure Operator

• VIP - Virtual Infrastructure Provider

• PIP - Physical Infrastructure Provider

CPSRT2010 Workshop, 2 December 2010 Security Services Lifecycle Management Slide_6

Page 7: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

CPSRT2010 Workshop, 2 December 2010 Security Services Lifecycle Management Slide_7

Security Service Lifecycle Management in On-Demand Resources/Services Provisioning

• On-Demand Infrastructure Services Provisioning requires definition of Services Lifecycle Management Multidomain multi-provider environment Includes standard virtualisation procedures and mechanisms

• Requires dynamic creation of Security/Trust Federations in multi-domain environment Based on available Trust Anchors

– Physical Resources (hosting platforms)– SLA or SLA negotiators/contractors– All other security context/credentials/keys should be derived from them

• Access control infrastructure dynamically created and policy/attributes dynamically configured Access/authorisation session/context management

• Composable Services Architecture (CSA) as a platform for dynamically configurable composable services provisioning

Page 8: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

Composable Services Architecture

CPSRT2010 Workshop, 2 December 2010 Security Services Lifecycle Management Slide_8

Applications and User Terminals

Composition Layer/Serv

(Reservation SLA Negotiatn)

Logical Abstraction Layer for Component Services and Resources

Control & ManagementPlane

(Operation, Orchestration)

Composable Services Middleware(GEMBus)

Network InfrastructureComputeResources

StorageResources

Component Services & Resources – Physical Resources level

Proxy (adaptors/containers) - Component Services and Resources

Proxy (adaptors/containers) – Composed/Virtualised Services and Resources

MD SLC Registry Logging Security

User Client

Composable Services lifecycle/provisioning stages

(1) Request(2) Composition/ Reservation(3) Deployment(4) Operation(5) Decommissioning

Separation of Data Plane, Control Plane, Management Plane

Control/ Mngnt LinksData Links

Virtual Infrastructure/Resources level

Page 9: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

CSA Services Delivery Framework (SDF) Composable Services Provisioning Workflow

Main stages/phases• Service Request (including SLA

negotiation)• Composition/Reservation (aka

design)• Deployment, including

Reqistration/Synchronisation• Operation (including Monitoring)• Decommissioning

Additional stages• Re-Composition should address

incremental infrastructure changes• Recovery/Migration can use SL-MD

to initiate resources re-synchronisation but may require re-composition

The whole workflow is supported by the Service Lifecycle Metadata Service (SL MD)

Based on the TMF SDFCPSRT2010 Workshop, 2 December 2010 Security Services Lifecycle Management Slide_9

Service Request/SLA Negotiation

Composition/ Reservation

Deployment

Operation(Monitoring)

Decommissioning

Registr&Synchro

Recovery/ Migration

Re-Composition

Service Lifecycle Metadata Service(SL MD)

ProvisiongSession Managnt

Page 10: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

TMF Service Delivery Framework (SDF)

Security Services Lifecycle Management Slide_10

Goal: Automation of the whole service delivery and operation process (TMF SDF, http://www.tmforum.org/ServiceDeliveryFramework/4664/home.html)

End-to-end service management in a multi-service providers environment End-to-end service management in a composite, hosted and/or syndicated service environment Management functions to support a highly distributed service environment, for example unified or federated security, user profile management, charging etc. Any other scenario that pertains to a given phase of the service lifecycle challenges, such as on-boarding, provisioning, or service creation

CPSRT2010 Workshop, 2 December 2010

Page 11: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

SDF Reference Architecture (refactored from SDF)

Security Services Lifecycle Management Slide_11

SDF ServiceRepository (ISS)

SDF Service Lifecycle Metadata

Coordination (ISS)

SDF Service DesignManagement (ISS)

SDF Service Deployment

Management (ISS)

SDF Service ProvisngMngnt (MSS) SDF Service

Instance

SDF ServiceLifecycle Metadata

Repository (ISS)

Design

Operate

Deploy

SDF Service Resource Fulfillment (ISS)

SDF Service StateMonitor (ISS)

SDF Service Resource Monitor (ISS)

SDF Service Resource Usage Monitor (ISS)

SDF Service Quality/Problem Mngnt (MSS)

SDF Service UsageMngnt (MSS)

Composite Services provisioned on-demand

9

3

7

6

6

84

2

1

10

16

15

14

13

12

1117

SDF MSS SDF ISS

1 – Service Instance2 - Service Management Interface3 – Service Functional Interface4 - Management Support Service (SDF MSS)8 - Infrastructure Support Service (ISS)DESIGN stage9 - Service Repository10 - Service Lifecycle Metadata Repository16 - Service Design ManagementDEPLOYMENT stage10 - Service Lifecycle Metadata Repository11 - Service Lifecycle Metadata Coordinator17 - Service Deployment ManagementOPERATION stage5 - Service Provisioning Management6 - Service Quality/Problem Management7 - Service Usage Monitor12 - Service State Monitor13 - Service Resource Fulfillment14 - Service Resource Monitor15 - Resource Usage Monitor

CPSRT2010 Workshop, 2 December 2010

Page 12: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

Composable Services Architecture –Lifecycle stages workflow

CPSRT2010 Workshop, 2 December 2010 Security Services Lifecycle Management Slide_12

Composable Services lifecycle/provisioning stages

(1) Request(2) Composition/ Reservation(3) Deployment(4) Operation(5) Decommissioning

MD SLC – Service Lifecycle Metadata

GEMBus – GEANT Multidomain Bus

Control/ Mngnt Links

Data Links

Applications and User Terminals

Composition Layer /Serv

(Reservation SLA

Negotiatn)

Logical Abstraction Layer for Component Services and Resources

Control & Management

Plane

(Operation, Orchestration)

Composable Services Middleware(GEMBus/GESB)

Network InfrastructureComputeResources

StorageResources

Component Services & Resources

Proxy (adaptors/containers) - Component Services and Resources

Proxy (adaptors/containers) – Composed/Virtualised Services and Resources

MD SLC Registry Logging Security

User Client

1

1

2

2

2

2

2

3

3

3

3

3

34

2

44

4

4

4ServServServ

Page 13: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

Security Services Lifecycle Management Slide_13

Security Services Lifecycle Management Model (compliant to CSA SDF/lifecycle model)

Security Service request and generation of the GRI that will serve as a provisioning session identifier and will bind all other stages and related security context.

Reservation session binding that provides support for complex reservation process including required access control and policy enforcement.

Deployment stage begins after all component resources have been reserved and includes distribution of the security context and binding the reserved resources or services to GRI as a common provisioning session ID.

Registration&Synchronisation stage (optional) specifically targets possible scenarios with the provisioned services migration or failover/interruption. In a simple case, the Registration stage binds the local resource or hosting platform run-time process ID to the GRI as a provisioning session ID.

Operation stage - security services provide access control to the provisioned services and maintain the service access or usage session.

Decommissioning stage ensures that all sessions are terminated, data are cleaned up and session security context is recycled.

Service Request (GRI)

Reserv Session Binding

Deploy- ment & RsrBind

Operatn Access

Decom-mision

Registr Synchro (Opt)

CPSRT2010 Workshop, 2 December 2010

Page 14: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

Security Services Lifecycle Management Slide_14

Relation between SecuritySLM and general SLM

Additional SSLM stages and mechanisms to ensure consistency of the security context managementSecurity Service Request that initiates creation of the dynamic security association and may use SLA

security context.Reservation Session Binding with GRI (as part of Planning stage) that provides support for complex

reservation process including required access control and policy enforcement. Registration&Synchronisation stage (as part Deployment stage) specifically targets possible

scenarios with the provisioned services migration or failover/interruption. In a simple case, the Registration stage binds the local resource or hosting platform run-time process ID to the GRI as a provisioning session ID.

SecServ Request (GRI)

Reserv Session Binding

Deploy- ment & RsrBind

Operatn Access

Decom-mision

Registr Synchro (Ext)

Service Request (GRI)

Operate Maintain

Decom-mision

Design Development Reservation

Deployment (a) Services Lifecycle Stages

(b) Security Services Lifecycle Stages

CPSRT2010 Workshop, 2 December 2010

Page 15: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

Relation between SSLM/SLM stages and supporting general and security mechanisms

Security Services Lifecycle Management Slide_15

SLMstages

Request Design/ReservationDevelopment

Deployment Operation Decomissioning

Process/Activity

SLA Negotiation

Service/ ResourceComposition Reservation

CompositionConfiguration

Orchestration/SessionManagement

LogoffAccounting

Mechanisms/MethodsSLA V V

Workflow (V) V

Metadata V V V V

DynamicSecurityAssociatn

(V) V V

AuthZ SessionContext

V (V) V

Logging (V) (V) V V

CPSRT2010 Workshop, 2 December 2010

Page 16: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

Implementation suggestions

Extend existing GAAA-Toolkit pluggable Java library to support dynamic Security/AAI infrastructure creation and integration with provisioned VI• Provides GAAA Authorisation API (GAAAPI) functions with extended AuthZ and

session management functionalitySupport for SDF workflow and Security Services Lifecycle Management

• Needs general infrastructure services such as Metadata SLMDefine and implement Common Security Service Interface (CSSI)

• Supports both internal applications calls and Web service integration via Spring security

• Implements GSS-API and extends it with GAAAPI functionalityUse standard Messaging, Transport and Network security mechanisms provided

by implementation platform• Implementation platform selection – ESB/WS/SOA (Fuse, Apache ServiceMix, etc.)

CPSRT2010 Workshop, 2 December 2010 Security Services Lifecycle Management Slide_16

Page 17: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

GridNets2009, 8-9 September 2009, Athens

Multidomain Network/Complex Resource Provisioning (NRP/CRP) –Provisioning sequences

NRPS – Network Resource Provisioning System NSP – Network Service PlainDC – Domain ControllerIDC – Interdomain Controller

Provisioning sequences Agent (A) Polling (P) Relay (R)

Token based policy enforcement

GRI – Global Reservation IDAuthZ tickets for multidomain

context mngntT - Token

AAA – AuthN, AuthZ, Accounting Server PDP – Policy Decision Point PEP – Policy Enforcement Point TVS – Token Validation Service KGS – Key Generation Service

NSP/AAA

PEPUser Client

DC/NRPS

NE

PEP

NE

PEP

NE

Agent (AAA)

P

R

AService(AAA)plane

Controlplane

DestHost

Appli-catio

n

Network plane

DC/AAA

PAPPDP

PAP PAPPDPPDP

TVSTVSTVS

DC/NRPSDC/NRPS

NSP/AAA NSP/AAA

Page 18: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

GridNets2009, 8-9 September 2009, Athens

Multidomain Complex Resource Provisioning (СRP) –Stage 1 – Path building and Advance Reservation

AAA – AuthN, AuthZ, Accounting Server PDP – Policy Decision PointPEP – Policy Enforcement PointTVS – Token Validation Service

IDC/AAA

PEPUser Client

DC/NRPS

NE

PEP

NE

PEP

NE

Service(AAA)plane

Controlplane

DestHost

Appli-catio

n

Network plane

DC/AAA

PAPPDP

PAP PAPPDPPDP

TVSTVSTVS

DC/NRPSDC/NRPS

GRI GRI GRI

IDC/AAA IDC/AAA

IDC – Interdomain ControllerDC – Domain ControllerNRPS – Network Resource Provisioning SystemNE - Network Element

Token based signalling and access control

GRI – Global Reservation IDAzTicket – AuthZ ticket for

multidomain context mngntAT – Access Token

Pilot Token type 3 used at the Stage 1 Reservation for signalling and interdomain context communication* As container for GRI and AzTicket

Pilot Token type 4 used at the Stage 2 for setup information communication

Page 19: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

GridNets2009, 8-9 September 2009, Athens

Multidomain Complex Resource Provisioning (СRP) –Stage 2 – Deployment (setup and key distribution)

AAA – AuthN, AuthZ, Accounting Server PDP – Policy Decision PointPEP – Policy Enforcement PointTVS – Token Validation Service

IDC – Interdomain ControllerDC – Domain ControllerNRPS – Network Resource Provisioning SystemNE - Network Element

Token based signalling and access control

GRI – Global Reservation IDAzTicket – AuthZ ticket for

multidomain context mngntAT – Access Token

Pilot Token type 3 used at the Stage 1 Reservation for signalling and interdomain context communication* As container for GRI and AzTicket

Pilot Token type 4 used at the Stage 2 for setup information communication

IDC/AAA

PEPUser Client

DC/NRPS

NE

PEP

NE

PEP

NE

Service(AAA)plane

Controlplane

DestHost

Appli-catio

n

Network plane

DC/AAA

PAPPDP

PAP PAPPDPPDP

TVSTVSTVS

DC/NRPSDC/NRPS

GRI GRI GRI

IDC/AAA IDC/AAA

PT4(AzTick)PT4(AzTick)

Page 20: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

GridNets2009, 8-9 September 2009, Athens

Multidomain Complex Resource Provisioning (СRP) –Stage 3 – Access Control (using access tokens)

Token based signalling and access control

GRI – Global Reservation IDAzTicket – AuthZ ticket for

multidomain context mngntAT – Access Token

Pilot Token type 3 used at the Stage 1 Reservation for signalling and interdomain context communication* As container for GRI and

AzTicket

Pilot Token type 4 used at the Stage 2 for setup information communication

AAA – AuthN, AuthZ, Accounting Server PDP – Policy Decision PointPEP – Policy Enforcement PointTVS – Token Validation Service

IDC – Interdomain ControllerDC – Domain ControllerNRPS – Network Resource Provisioning SystemNE - Network Element

IDC/AAA

PEPUser Client

DC/NRPS

NE

PEP

NE

PEP

NE

Service(AAA)plane

Controlplane

DestHost

Appli-catio

n

Network plane

DC/AAA

PAPPDP

PAP PAPPDPPDP

TVSTVSTVS

DC/NRPSDC/NRPS

GRI

AT

GRI GRI

ATAT

IDC/AAA IDC/AAA

AT

PT4(AzTick) PT4(AzTick)

Page 21: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

GridNets2009, 8-9 September 2009, Athens

СRP Stages and Authorisation Session Types

Requires consistent security and session context managementGlobal Reservation ID (GRI) is created at the beginning of the provisioning session (Reservation stage) and

binds all sessions

GRI generated

Reservation Deployment Access/Use Decommissioning

Access Session

Provisioning session

Reservation Session

Access Control Policy

SLA, WS-Agreement

Accounting, Billing Network

Config.

AccessToken PilotToken4

PilotToken0-3

Page 22: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

GridNets2009, 8-9 September 2009, Athens

Access Token and Pilot Token Types

AType 0 – Simple access token (refers to the reserved resources context)AType 1 – Access token containing Obligations collected from previous domainsPType 0 – Container for GRI onlyPType 1 – Container for communicating the GRI during the reservation stage

• Contains the mandatory SessionId=GRI attribute and an optional Condition elementPType 2 – Origin/requestor authenticating token

• TokenValue element contains a value that can be used as the authentication value for the token origin

• TokenValue may be calculated of the (GRI, IssuerId, TokenId) by applying e.g. HMAC function with the requestor’s symmetric or private key.

PType 3 – Extends Type 2 with the Domains element that allows collecting domains security context information when passing multiple domains during the reservation process• Domains’ context may include the previous token and the domain’s trust anchor or public key

PType 4 – Used at the deployment stage and can communicate between domains security context information about all participating in the provisioned lightpath or network infrastructure resources• Can be used for programming/setting up a TVS infrastructure for consistent access control

tokens processing at the resource access stage

Page 23: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

GridNets2009, 8-9 September 2009, Athens

XML Token Format – Access and Pilot Tokens

Support inter-domain security/session context communication to allowsmultidomain provisioning scenarios

Ensure Integrity of the AuthZ decision Keeps AuthN/AuthZ context Allow Obligated Decisions (e.g. XACML Obligations)

Supports simple delegation scenarios Can be used for establish session-based trust relations between domains Allows easy mapping to SAML and XACML related elements

Page 24: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

GridNets2009, 8-9 September 2009, Athens

Chaining Pilot Tokens in multidomain signalling

* Pilot Token type 3 issued by domain UVA

Domain1 “viola” Resource Requestor Domain2

“uva”

Domain3 “uclp”

<AAA:AuthzToken xmlns:AAA="http://www.aaauthreach.org/ns/AAA"

Issuer=http://testbed.ist-phosphorus.eu/uva/AAA/TVS/tokenpilotSessionId="740b241e711ece3b128c97f990c282adcbf476bb"TokenId="dc58b505f9690692f7a6312912d0fb4c" type="pilot-type3">

<AAA:TokenValue>190a3c1554a500e912ea75a367c822c09eceaa2f </AAA:TokenValue><AAA:Conditions NotBefore="2009-01-30T08:57:40.462Z" NotOnOrAfter="2009-01-30T09:21:40.462Z"/><AAA:DomainsContext>

<AAA:Domain domainId="http://testbed.ist-phosphorus.eu/viola"><AAA:AuthzToken Issuer="http://testbed.ist-phosphorus.eu/viola/aaa/TVS/token-pilot«

SessionId="2515ab7803a86397f3d60c670d199010aa96cb51"TokenId="c44a2f5f70346fdc2a2244fecbcdd244">

<AAA:TokenValue>dee1c29719b9098b361cab4cfcd086700ca2f414</AAA:TokenValue><AAA:Conditions NotBefore="2009-01-30T07:57:35.227Z"

NotOnOrAfter="2009-01-31T07:57:35.227Z"/></AAA:AuthzToken><AAA:KeyInfo> http://testbed.ist-phosphorus.eu/viola/_public_key_ </AAA:KeyInfo>

</AAA:Domain></AAA:DomainsContext>

</AAA:AuthzToken>

Page 25: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

Future work and Discussion

• Definition of and reference implementation of the Common Security Services Interface (CSSI) As extension to industry adopted GSS-API Incorporate GAAA-AuthZ (RFC2904) Authorisation interface Extends for Session Security Context Management and dynamic

trust/security association management• Wide range of formalisation and modeling work• Implementation in projects GEANT3 and GEYSERS

• CSA and Security Services Lifecycle Management model is proposed as a possible deliverable for OGF ISOD RG

CPSRT2010 Workshop, 2 December 2010 Security Services Lifecycle Management Slide_25

Page 26: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

Additional Information

• TMF SDF Lifecycle Management model

Security Services Lifecycle Management Slide_26CPSRT2010 Workshop, 2 December 2010

Page 27: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

AuthN/AuthZ Infrastructure (AAI) in GEYSERS

Basic CSSI services Data encryptionDigital signatureAuthenticationAuthorizationPolicy managementSecurity session and context

managementCalled from services (or part of core interfaces)SLI (SML-LICL)CCI (NCP-LICL)NLI (NCP-LICL)LPI (LICL-PHY)NIPS-UNI

SML

NCP

LICL

VITM

NIPS Server

CCI

NIPS-UNI

SLI

NLI

PHY

LPIG

EYSE

RS

Secu

rity

(AA

I)

CSSI

CPSRT2010 Workshop, 2 December 2010 Security Services Lifecycle Management Slide_27

Page 28: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

PEP: Policy Enforcement PointPDP: Policy Decision PointPAP: Policy Administration PointDACS: Dynamic Access Control Service

GEYSERS AAI Reference Model

AuthN Service

PDP

PAPAuthN DB

Token Validation Service (TVS)SecCtx Handler

AAI Gateway

PEP Dyn ACServiceMngnt

Common Security Services Interface (CSSI)

Config, Attr

Trust/KeyMngnt

CPSRT2010 Workshop, 2 December 2010 Security Services Lifecycle Management Slide_28

Page 29: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

GEMBus Infrastructure for Composable Service

GMI provides common dynamically configurable messaging infrastructure for Composable services communication

CPSRT2010 Workshop, 2 December 2010 Security Services Lifecycle Management Slide_29

GEMBus Infrastructure Services

GEMBus Component Services

Service 2(CSrvID, SesID)

GEMBus Registry

Composition & Orchestration

Logging Service

Service 1(CSrvID, SesID)

Service 3(CSrvID, SesID)

Service 4(CSrvID, SesID)

ESB

GEMBus Messaging Infrastructure (GMI)

Routing

Configuration

Interceptors (AspOrient)

Security Service

Message Handling

Page 30: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

Example Service Composition – Service NX

CSrvID, SesID – bind component services into the on-demand provisioned Composed service NX

CPSRT2010 Workshop, 2 December 2010 Security Services Lifecycle Management Slide_30

Role and place for Composition and

Orchestration

* Composable services or GEMBus

infrastructure service

UserClient

(CSrvID,SesID)

Service 4(CSrvID,SesID)

Service 3(CSrvID,SesID)

Service 1(CSrvID,SesID)

Service 2(CSrvID,SesID)

UserClient

(CSrvID,SesID)

Frontend CompSrvNX(CSrvID,SesID)

Service 4(CSrvID,SesID)

Service 3(CSrvID,SesID)

Service 1(CSrvID,SesID)

Service 2(CSrvID,SesID)

Composed Service NX(CSrvID,SesID)

Composed Service NX(CSrvID,SesID)

User Interface

Page 31: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

GEYSERS Reference Model

Role:• VIO• VIP• PIP

CPSRT2010 Workshop, 2 December 2010 Security Services Lifecycle Management Slide_31

Page 32: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

Role of GEYSERS actors with respect to its architectural layers

CPSRT2010 Workshop, 2 December 2010 Security Services Lifecycle Management Slide_32

Page 33: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

CPSRT2010 Workshop, 2 December 2010 Security Services Lifecycle Management Slide_33

GEYSERS Service Delivery Framework (SDF)

• Service provisioning workflow by VIP: Creation of the Virtual Infrastructure (VI) May include more engineers support

• Service provisioning workflow by VIO: Creation and operation of the Virtual Infrastructure on-demand for specific project,

tasks or user groups Should be completely automatic

• Should also include activities/stages for infrastructure re-planning, restoration and migration

• Adopted TeleManagement Forum Service Delivery Framework (TMF SDF)

• GEYSERS Project - http://www.geysers.eu/

Page 34: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

GEYSSERS Service Delivery Framework/Workflow

Geysers SDF supports both Geysers infrastructure development and deployments and its operation for on-demand Infrastructure services provisioning by VIO

Security Services Lifecycle Management Slide_34

Service Request/SLA Negotiation

Planning(Design)

Deployment(Instant&

Config&Synchro)

Operation&Monitoring

(by VIO)

Decommissioning

Service Request/SLA Negotiation

Planning (Compos/Reserv)

Deployment

Operation(Monitoring)

Decommissioning

Registr&SynchroNetwork+ITServices

Provisioning Workflow by VIO

Recovery/ Migration

Re-Planning

Services Provisioning

Workflow by VIP

Recovery/ Migration

Re-planning

CPSRT2010 Workshop, 2 December 2010

Page 35: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

Existing framework in on-Demand Infrastructure Services Provisioning and Lifecylce Management

TMF standardised frameworks, practices and procedures• SDF - Service Delivery Framework• SLA management• NGOSS – New Generation Operations System Services (including eTOM) Microsoft Security Development Lifecycle (SDL) Framework• Primarily focused on the product development process by engineers/programmers

(Training) – Requirements – Design – Implementation – Verification – Release –(Response)

CPSRT2010 Workshop, 2 December 2010 Security Services Lifecycle Management Slide_35

Page 36: Security Services Lifecycle Management - SALSAHPCsalsahpc.indiana.edu/CloudCom2010/slides/PDF/Security Services... · Security Services Lifecycle Management Slide _ 7 Security Service

SDF main stages and phases

Main stages/phases• Service Request (including SLA negotiation)• Planning (including Composition, Reservation and Design)• Deployment (including Reqistration/Synchronisation) • Operation (including Monitoring)• Decommissioning

Additional stages• Re-Composition should address incremental infrastructure changes• Recovery/Migration can use SL-MD to initiate resources re-synchronisation but may require re-

compositionThe whole workflow should be supported by the Service Lifecycle Metadata Service (SL MD)

CPSRT2010 Workshop, 2 December 2010 Security Services Lifecycle Management Slide_36