Difference between revisions of "ROD Security"
Jump to navigation
Jump to search
Line 11: | Line 11: | ||
* https://wiki.egi.eu/wiki/SVG#What_to_do_if_you_find_a_Software_Vulnerability_in_the_EGI_infrastructure | * https://wiki.egi.eu/wiki/SVG#What_to_do_if_you_find_a_Software_Vulnerability_in_the_EGI_infrastructure | ||
Sites having critical vulnerabilities are handled according to EGI Critical Vulnerability Handling Procedure, and if they do not respond properly, they may face suspension. | Sites having critical vulnerabilities are handled according to EGI Critical Vulnerability Handling Procedure, and if they do not respond properly, they may face suspension. | ||
* https://documents.egi.eu/document/283 | * https://documents.egi.eu/document/283 |
Revision as of 14:40, 11 September 2014
Main | EGI.eu operations services | Support | Documentation | Tools | Activities | Performance | Technology | Catch-all Services | Resource Allocation | Security |
EGI Infrastructure Operations Oversight menu: | Home • | EGI.eu Operations Team • | Regional Operators (ROD) |
Security
Sites facing or suspecting a security incident on their resources have to follow Incident Handling Procedure:
New vulnerability issues of the middleware should be handled as defined in the EGI
with a guide what to do when You find a vulnerability:
Sites having critical vulnerabilities are handled according to EGI Critical Vulnerability Handling Procedure, and if they do not respond properly, they may face suspension.