Alert.png The wiki is deprecated and due to be decommissioned by the end of September 2022.
The content is being migrated to other supports, new updates will be ignored and lost.
If needed you can get in touch with EGI SDIS team using operations @ egi.eu.

Difference between revisions of "Fedcloud-tf:WorkGroups:Security"

From EGIWiki
Jump to navigation Jump to search
(Initial commit :-))
 
Line 2: Line 2:


<font color="red">Leader: Linda Cornwall</font>
<font color="red">Leader: Linda Cornwall</font>
= Scenario 11: Security =
{| class="wikitable"
|-
! Role
! Institution
! Name
|-
| Scenario Leader
| STFC
| Linda Cornwall
|-
| Collaborator
| EGI CSIRT / Nikhef
| Sven Gabriel
|-
| Collaborator
| CESNET
| Boris Parák
|-
| Collaborator
| IFCA
| Enol Fernández
|-
| Collaborator
| GRNET
| Christos Loverdos
|}


== Scope  ==
== Scope  ==


This workgroup deals with security issues and implications of running a federated cloud infrastructure, namely being able to prevent and handle security incidents.
This workgroup deals with security issues and implications of running a federated cloud infrastructure, namely being able to prevent and handle security incidents.
== References ==
<references />


== Roadmap  ==
== Roadmap  ==

Revision as of 18:54, 27 April 2015

Main Roadmap and Innovation Technology For Users For Resource Providers Media


Workbenches: Open issues
Scenario 1
VM Management
Scenario 2
Data Management
Scenario 3
Information Systems
Scenario 4
Accounting
Scenario 5
Monitoring
Scenario 6
Notification
Scenario 7
Federated AAI
Scenario 8
VM Image Management
Scenario 9
Brokering
Scenario 10
Contextualisation
Scenario 11
Security



Leader: Linda Cornwall

Scenario 11: Security

Role Institution Name
Scenario Leader STFC Linda Cornwall
Collaborator EGI CSIRT / Nikhef Sven Gabriel
Collaborator CESNET Boris Parák
Collaborator IFCA Enol Fernández
Collaborator GRNET Christos Loverdos

Scope

This workgroup deals with security issues and implications of running a federated cloud infrastructure, namely being able to prevent and handle security incidents.

References


Roadmap

  • Run security challenges.
  • Design and implement tools for IR in the context of virtual machine management.
  • Design and implement tools for IR in the context of user management.
  • Design and implement tools for IR in the context of data management.