Alert.png The wiki is deprecated and due to be decommissioned by the end of September 2022.
The content is being migrated to other supports, new updates will be ignored and lost.
If needed you can get in touch with EGI SDIS team using operations @ egi.eu.

EGI CSIRT:Security challenges

From EGIWiki
Jump to navigation Jump to search


| Mission | Members | Contacts
| Incident handling | Alerts | Monitoring | Security challenges | Procedures | Dissemination



General Information

Terms of reference

Mandate

The Security Service Challenges (SSC) are executed under the authority of the EGI-CSIRT.

The goal of the EGI-CSIRT Security Drills, is to investigate whether sufficient information is available to be able conduct an audit trace as part of an incident response, and to ensure that appropriate communications channels are available.

More specifically, the SSC will address the following security aspects of the Grid:

  1. Compliance with, and understanding of, the Audit Requirements for EGI;
  2. Compliance with, and understanding of, the EGI-CSIRT Incident Handling and Response Guide;
  3. The overall execution of the incident handling procedures.

Outline

Schedule

EGI-CSIRT conducts the SSC semi-regularly across all the EGI Grid Sites. The particulars of the challenge will evolve over time. Additional information, including historical information, about the SSC is available from the SSC Wiki. Outline of the Challenge

The test job is a program which is launched by means of the published methods applicable to the Grid. It will be submitted under unobtrusive credentials that will be retained for the duration of the test. After 72 wall-clock-hours, the job will terminate itself. During this time, the job will mostly lie dormant, but it will wake up occasionally to report its presence through an out-of-band logging channel. While the job is active, the Security Service at the target Site is asked to make certain investigations and to take actions. The events are recorded. Launching the Challenge

The Test Operator (TOP) submits a Grid job to a Computing Element (CE) located on the Site under test. The job is submitted under valid credentials, i.e. Distinguished Name (DN) and Virtual Organization (VO). Requirements on the challenged sites

The sites contacted for a challenge are asked to follow the normal security incident response procedure, and react exactly as if the incident was real, with the two following exceptions:

      1. No sanctions must be applied against the Virtual
         Organization (VO) that was used to submit the job.

      2. All "multi-destination" alerts must be addressed to
         the e-mail list which has been designated for the test:

              project-egee-security-challenge@cern.ch

         DO NOT use:
              project-lcg-security-csirts@in2p3.fr
         for Security Service Challenges. Instead, insert the
         originally intended "multi-destination" address(es) in
         the body of your message.

Alerting and Reporting

All e-mail exchanges related to the SSC incident, MUST:

   1. Include the text “[THIS IS A TEST][<NAME OF YOUR SITE>]” in the “Subject” field;
   2. Show the following text as the first part of the message:

      This e-mail is an alert about a TEST incident. It is executed under
      the supervision of EGEE/LCG Operational Security Coordination Team
      (OSCT) as part of the OSCT Security Services Challenge (SSC). More
      information about the SSC can be found at

              https://wiki.egi.eu/wiki/EGI_CSIRT:SSC

      You are asked to following the normal incident procedure, but you
      MUST_NOT take any collective action against the VO of the offending
      user.

   3. When the out-of-band log shows that the job is established at the designated CE, then TOP alerts the Computer Security Incident Response Team (CSIRT) at the target Site with the following message:

      Consider any activity from the following user as malicious.
      The distinguished name (DN) of the user is:

              <The user DN>

      Please handle this test incident according to the normal incident
      response procedure with the two exceptions listed below:

      1. No sanctions must be applied against the Virtual Organization (VO)
         that was used to submit the job.
      2. All "multi-destination" alerts must be addressed to the e-mail list
         which has been designated for the test:

             project-egee-security-challenge@cern.ch

             DO NOT use project-lcg-security-csirts@in2p3.fr for Security Challenges.
             Instead, insert the originally intended "multi-destination" address(es)
             in the body of your message.

The CSIRT at the target Site is expected to respond appropriately.

Post processing, clean up

As part of the incident handling, Grid authorizations may have been withdrawn from the DN that was used to submit the job. When the incident response procedure is complete, TOP will explicitly request restoration of any such authorizations to their original state.

De-briefing

When the challenge has been completed on a representative number of Sites, TOP will ask for de-briefing input from the participating Sites. Material submitted will be used to edit a report. The report will be circulated to the contributors for comments before being presented to the EGI-CSIRT.

Source

Parts of this article came from the OSCT wiki, this was written by the EGEE Operational Security Coordination Team.



Security Drills Framework

What it is about

Alerting - Reporting - Communication

Job Submission

Job status and Security Operations Monitoring

Evaluation - Report generation