EGI Operational Security Procedures
- Security Incident Handling Procedure, defined by EGI CSIRT. The document has been approved by EGI OMB and PMB . Also there is a Site Incident Response checklist [] and an Incident Response Flowchart []. The "Security Incident Handling Procedure" define site and incident coordinator responsibilities when handling Grid-related security incident. ALL EGI sites are required to follow the new procedure to report and handle Grid-related security incident. We strongly encourage our security contacts and system administrators to have a printing copy of this procedure. For more details on this EGI procedure, here are some useful links:
Incident reporting wiki page: []. Forensic Howto page . Site Incident Response checklist at [].
- Vulnerability Issue Handling Procedure, defined by EGI SVG. The document has been approved by EGI OMB and PMB. The "Software Vulnerability Issue Handling Process" describes the process used to report and resolve Grid Software vulnerabilities in the EGI Inspire project. It describes the responsibilities of various people within the SVG, the EGI InSPIRE project and in the communities providing software distributed in the EGI Unified Middleware Distribution and how the various groups interact with this process. For more details you can browse the wiki page https://wiki.egi.eu/wiki/SVG#What_to_do_if_you_find_a_Software_Vulnerability_in_the_EGI_infrastructure .
- EGI Critical Vulnerability Handling Procedure . The "EGI Critical Vulnerability Handling Procedure" defines the procedure for dealing with Critical Security Issues where action needs to be taken by a single site or multiple sites.
All operational procedures can be found at: https://wiki.egi.eu/wiki/Operational_Procedures
EGI Security Policies
The policy documents produced by the former JSPG are valid since 1st May for the EGI partners. They are in the process of being imported into new documents template. For all up to date EGI security policies, please refer to the EGI Security Policy Group wiki page.