|Main||EGI.eu operations services||Support||Documentation||Tools||Activities||Performance||Technology||Catch-all Services||Resource Allocation||Security|
|Inspire reports menu:||Home •||SA1 weekly Reports •||SA1 Task QR Reports •||NGI QR Reports •||NGI QR User support Reports|
1. Task Meetings
|Date (dd/mm/yyyy)||Url Indico Agenda||Title||Outcome|
|15/11/20112||https://www.egi.eu/indico/conferenceDisplay.py?confId=1250||EGI SVG Monthly meeting||Review activities of the previous month and plan for the coming month|
|22/11/2012||https://www.egi.eu/indico/conferenceDisplay.py?confId=1255||EGI CSIRT team Monthly meeting||Review activities of the previous month and plan for the coming month|
|13/12/2012||https://www.egi.eu/indico/conferenceDisplay.py?confId=1256||EGI CSIRT team monthly meeting||Review activities of the previous month and plan for the coming month|
|20/12/2012||https://www.egi.eu/indico/conferenceDisplay.py?confId=1285||EGI SVG Monthly meeting||Review activities of the previous month and plan for the coming month|
|17/01/2013||https://www.egi.eu/indico/conferenceDisplay.py?confId=1300||EGI SVG Monthly meeting||Review activities of the previous month and plan for the coming month|
|18/01/2013||https://www.egi.eu/indico/conferenceDisplay.py?confId=1297||EGI CSIRT team monthly meeting||Review activities of the previous month and plan for the coming month|
|Weekly EVO meetings (every Monday)||Minutes recorded in EGI CSIRT private wiki (not publicly accessible)||IRTF weekly meeting||Operational security issues are reviewed weekly|
|Weekly EVO meetings (every Monday)||https://indico.egi.eu/indico/categoryDisplay.py?categId=71||"Monitoring & follow up of sites running unsupported software" - joint with EGI Operations||Status of the Sites upgrading to supported software are reviewed weekly|
2. Main Achievements
The incident response team handled one minor security incident involving a site in Estonia during the quarter and issued just one security advisory.
This relatively quiet period in terms of incidents was however used to make very good progress on the monitoring, persuading, and even forcing, all Resource Centres to upgrade or replace software that was no longer supported for security updates. A large number of components of gLite 3.2 were required to be removed by 1st November 2012. An intense upgrade campaign was necessary with many of the SA1.2 staff very actively involved both from the monitoring and the incident teams. This was very successful in that the vast majority of sites upgraded before the deadline and the remaining small number voluntarily removed the services from production. There was no requirement to suspend a site. The final components of gLite 3.2 had to be upgraded or removed before the end of January 2013. Again this campaign was very successful. We are now planning for the handling of the end of life of EMI 1 by the end of April 2013.
The upgrading of all EGI instances of WMS services which were still affected by the two vulnerabilities handled in the last quarter was also completed early in the quarter.
The security monitoring activity was very busy during the quarter, developing and deploying new custom security probes as required for monitoring for deployed software beyond end of support and also for implementing NGI SAM instances. A dedicated Nagios box was established to monitor middleware components.
After the successful run of security service challenge SSC6 last quarter, there has been little activity in this area during this quarter, partly because we still await upgrades and modifications to the special RTIR service used for monitoring progress in these service challenges and partly because of all the activity on middleware ugrade campaigns. Plans have been made for a number of NGI SSCs which will happen in 2013.
The Software Vulnerability Group handled more than ten new vulnerabilities during the quarter and issued or updated five advisories, one of which was High Risk. Work on the procedure for handling compromised certificates has started as has work to define the handling of software vulnerabilities in the period beyond the end of the EMI and IGE projects.
Preparations have been made for the next EGI-CSIRT security tutorial to happen at the ISGC2013 conference in Taipei in March 2013. An abstract on EGI security operations was also submitted to the conference and accepted for oral presentation. A poster on Security Training and best practice from the point of view of end users is being prepared for the April 2013 EGI Community Forum meeting.
It has long been recognised that the deployment of a centrally run emergency user suspension service would be extremely useful for the CSIRT during the handling of an ongoing security incident. The suspension of a compromised user identity, from the authorisation point of view, defined in one place and then automatically rolled out to all sites and services in a short period of time is currently missing. Technology, in the form of Argus, is now available to implement such a service. It also seems relatively straight forward to copy central suspension lists into other authorisation services. Discussions were held during this quarter with Operations, SPG and the OMB and deployment mechanisms are being planned.
Members of TSA1.2 participated in a WLCG security meeting at FNAL in the USA on the 17-18 December. This brought together security staff from EGI, OSG and NDGF and included full discussion of many operational security and policy issues
Finally, the team has been planning for the evolution of the security global task beyond the end of EGI-InSPIRE as input to the EGI workshop held at the end of January looking at the evolution of all such operational tasks.
3. Issues and Mitigation
|Issue Description||Mitigation Description|
4. Plans for the next period
The improvements to the RT/RTIR ticketing system for the tracking of security service challenges will be finalised.
Work will continue on requiring the timely migration from unsupported software, this time for the retirement of EMI 1 middleware and services, by the end of April 2013.
SSC6 will be fully analysed and one or two NGIs will perform national SSCs.
The new release (an alpha release) of Pakiti will take place this next quarter. Developments will be made to security monitoring to track all SVG and CSIRT alerts and advisories as required.
The EGI CSIRT operational procedure for compromised certificates will be finalised and submitted for approval. The SVG handling procedure for post EMI/IGE will be completed.
Security training will be given at the ISGC2013 conference in Taipei in March 2013 and SA1.2 staff will attend the EGI Community Forum to facilitate discussions on security issues.