egee security “pitch”

23
INFSO-RI-508833 Enabling Grids for E-sciencE www.eu-egee.org EGEE security “pitch” Olle Mulmo EGEE Chief Security Architect KTH, Sweden

Upload: huy

Post on 04-Jan-2016

36 views

Category:

Documents


0 download

DESCRIPTION

EGEE security “pitch”. Olle Mulmo EGEE Chief Security Architect KTH, Sweden. Project PR. EGEE. EGEE is the largest Grid infrastructure project in the World ? : 70 leading institutions in 27 countries, federated in regional Grids Leveraging national and regional grid activities - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: EGEE security “pitch”

INFSO-RI-508833

Enabling Grids for E-sciencE

www.eu-egee.org

EGEE security “pitch”

Olle MulmoEGEE Chief Security ArchitectKTH, Sweden

Page 2: EGEE security “pitch”

INFSO-RI-508833

Enabling Grids for E-sciencE

www.eu-egee.org

Project PR

Page 3: EGEE security “pitch”

Enabling Grids for E-sciencE

INFSO-RI-508833

EGEE

EGEE is the largest Grid infrastructureproject in the World?:

• 70 leading institutions in 27 countries, federated in regional Grids

• Leveraging national and regional grid activities

• ~32 M Euros EU funding for initially 2 years starting 1st April 2004

• EU review, February 2005 successful

• Preparing 2nd phase of the project – proposal to 3rd EU Grid call September 2005

Page 4: EGEE security “pitch”

Enabling Grids for E-sciencE

INFSO-RI-508833

EGEE Activities

• 48 % service activities (Grid Operations, Support and Management, Network Resource Provision)

• 24 % middleware re-engineering (Quality Assurance, Security, Network Services Development)

• 28 % networking (Management, Dissemination and Outreach, User Training and Education, Application Identification and Support, Policy and International Cooperation)

EGEE emphasis is on production grid operations

and end-user support

Page 5: EGEE security “pitch”

Enabling Grids for E-sciencE

INFSO-RI-508833

gLite

• First major release of gLite announced on April 5 – Focus on providing users early access to prototype

– Reusing existing components

– Addressing current shortcomings

• Interoperability & Co-existence with deployed infrastructure• (Cautious) service oriented approach

– Follow WSRF standardisation

• Site autonomy

Globus 2 based Web services based

gLite-2LCG-2

gLite-1LCG-1

Page 6: EGEE security “pitch”

Enabling Grids for E-sciencE

INFSO-RI-508833

Deployment of applications

Pilot New

• Pilot applications– High Energy Physics– Biomed applications

• Generic applications –Deployment under way– Computational Chemistry– Earth science research – EGEODE: first industrial application– Astrophysics

• With interest from – Hydrology– Seismology – Grid search engines – Stock market simulators– Digital video etc.– Industry (provider, user, supplier)

Page 7: EGEE security “pitch”

Enabling Grids for E-sciencE

INFSO-RI-508833

Country providing resourcesCountry anticipating joining EGEE/LCG

In EGEE-0 (LCG-2): >100 sites >10,000 CPUs >5 PB storage

Computing Resources – Feb. 2005

Page 8: EGEE security “pitch”

INFSO-RI-508833

Enabling Grids for E-sciencE

www.eu-egee.org

What I came here for

The EGEE view on Security

- some philosophy and baseline assumptions

Page 9: EGEE security “pitch”

Enabling Grids for E-sciencE

INFSO-RI-508833

Baseline assumptions

• Be Modular and Agnostic– Allow for new functionality to be included as an afterthought– Don’t settle on particular technologies needlessly

• Be Standard– Interoperate– Don’t roll our own, to the extent possible

• Be Distributed and Scalable– Avoid central services if possible– Always retain local control

Page 10: EGEE security “pitch”

Enabling Grids for E-sciencE

INFSO-RI-508833

Baseline assumptions

• VOs self-govern the resources made available to them– Yet try to minimize VO management!– Use AuthN to tie policy to individuals/resources

• An open-ended system– No central point of control– Can’t tell where the Grid ends

Page 11: EGEE security “pitch”

Enabling Grids for E-sciencE

INFSO-RI-508833

We can’t do anything too fancy

Requirements on functionality

AuthenticationAccess control

Credential mgmtDelegation

Privacy…

Existing capabilities

GridPMAsWS-Security

MyProxyShibboleth

VOMSGlobus

ParadigmShift

(SOA)

Other workalready

underway(LCG, OGSA,…)

Page 12: EGEE security “pitch”

INFSO-RI-508833

Enabling Grids for E-sciencE

www.eu-egee.org

Architecture

Technologies and more details

Page 13: EGEE security “pitch”

Enabling Grids for E-sciencE

INFSO-RI-508833

Authentication

• IGF: Federation of PMAs

• Better revocation technologies

• Managed and Active credential storage– i.e., where access policy can be enforced– Smart cards, MyProxy, …– Organizationally rooted trust (KCA, SIPS)– User-held password-scrambled files

should go away

Page 14: EGEE security “pitch”

Enabling Grids for E-sciencE

INFSO-RI-508833

Authorization

• Flexible framework to support for multiple authorities and mechanisms

• VOMS, banlist, grid-mapfile, SAML, …• Frank covered this in detail

Page 15: EGEE security “pitch”

Enabling Grids for E-sciencE

INFSO-RI-508833

Authorization model

• Decentralized– Predominantly role-based push model– Out-of-the-box support for VOMS– Semantic-free role and group attributes

• Pros– Scalability– Site autonomity– Multi-scenario support, VO self-governance

• Cons– Fine-grained access control (?)– VO management still heavyweight– VOMS is proprietary

Page 16: EGEE security “pitch”

Enabling Grids for E-sciencE

INFSO-RI-508833

VO management

• VOMS for now– modularity keeps it open for others

• Allow for lightweight VO deployment– Proposed solution: VO policy service– Brainchild

Page 17: EGEE security “pitch”

Enabling Grids for E-sciencE

INFSO-RI-508833

“Anonymity”

• Pseudonymity as an selective additional step to the SSO process

“Issue Joe’sprivileges to Zyx”

“The Grid”“The Grid”

Joe

PseudonymityService

CredentialStorage

1.2.

3.

4.

Obtain Grid credsfor Joe

“Joe → Zyx”

“User=Zyx Issuer=Pseudo CA”

AttributeAuthority

Page 18: EGEE security “pitch”

Enabling Grids for E-sciencE

INFSO-RI-508833

Data “privacy”

• Data always encrypted except in RAM• Simple solution that ignores all the hard problems

– (we have to as the system is open-ended)

Page 19: EGEE security “pitch”

Enabling Grids for E-sciencE

INFSO-RI-508833

Accounting

• Several solutions– and none of them are deployed at an EGEE level…

• Increasingly important

Page 20: EGEE security “pitch”

Enabling Grids for E-sciencE

INFSO-RI-508833

Audit

• Not solved at a Grid level– Scalability and information release issues

• Good tracking at the individual resource level for now

Page 21: EGEE security “pitch”

Enabling Grids for E-sciencE

INFSO-RI-508833

Integration and Development

• Middleware Security Group– Cross-activity group– Operations, Applications, Developers, OSG– Mailing list, phone conferences, face-to-face meetings

Page 22: EGEE security “pitch”

Enabling Grids for E-sciencE

INFSO-RI-508833

Operational Management

• Joint Security Policy Group– OSG, LCG participation

• EUGridPMA

• TERENA TF-CSIRT (incident response)– NREN CERTs start to show interest

Page 23: EGEE security “pitch”

Enabling Grids for E-sciencE

INFSO-RI-508833

More information

• EGEE Websitehttp://www.eu-egee.org

• DJRA3.1: Global Security Architecture (1st rev.)– https://edms.cern.ch/document/487004/

• DJRA3.2: Site Access Control (1st rev.)– https://edms.cern.ch/document/523948