Alert.png The wiki is deprecated and due to be decommissioned by the end of September 2022.
The content is being migrated to other supports, new updates will be ignored and lost.
If needed you can get in touch with EGI SDIS team using operations @ egi.eu.

Difference between revisions of "Fedcloud-tf:WorkGroups:Security"

From EGIWiki
Jump to navigation Jump to search
Line 35: Line 35:


This workgroup deals with security issues and implications of running a federated cloud infrastructure, namely being able to prevent and handle security incidents.
This workgroup deals with security issues and implications of running a federated cloud infrastructure, namely being able to prevent and handle security incidents.
== Roadmap  ==
* Run security challenges
* Design and implement tools for IR in the context of:
** User & Identity Management (UM/IM)
** Virtual Machine Management (VMM)
** Image Management (ImM)
** Data Management (DM)


== References ==
== References ==
<references />
<references />
== Roadmap  ==
* Run security challenges.
* Design and implement tools for IR in the context of virtual machine management.
* Design and implement tools for IR in the context of user management.
* Design and implement tools for IR in the context of data management.

Revision as of 18:57, 27 April 2015

Main Roadmap and Innovation Technology For Users For Resource Providers Media


Workbenches: Open issues
Scenario 1
VM Management
Scenario 2
Data Management
Scenario 3
Information Systems
Scenario 4
Accounting
Scenario 5
Monitoring
Scenario 6
Notification
Scenario 7
Federated AAI
Scenario 8
VM Image Management
Scenario 9
Brokering
Scenario 10
Contextualisation
Scenario 11
Security



Leader: Linda Cornwall

Scenario 11: Security

Role Institution Name
Scenario Leader STFC Linda Cornwall
Collaborator EGI CSIRT / Nikhef Sven Gabriel
Collaborator CESNET Boris Parák
Collaborator IFCA Enol Fernández
Collaborator GRNET Christos Loverdos

Scope

This workgroup deals with security issues and implications of running a federated cloud infrastructure, namely being able to prevent and handle security incidents.

Roadmap

  • Run security challenges
  • Design and implement tools for IR in the context of:
    • User & Identity Management (UM/IM)
    • Virtual Machine Management (VMM)
    • Image Management (ImM)
    • Data Management (DM)

References