Difference between revisions of "ROD Security"
Jump to navigation
Jump to search
Line 10: | Line 10: | ||
New vulnerability issues of the middleware should be handled as defined in the EGI vulnerability issue handling procedure. | New vulnerability issues of the middleware should be handled as defined in the EGI vulnerability issue handling procedure. | ||
Details and up-to-date versions of these security procedures can be found | Details and up-to-date versions of these security procedures can be found at EGI-CSIRT wiki [https://wiki.egi.eu/wiki/EGI_CSIRT:Policies]. |
Revision as of 21:54, 19 June 2011
Documentation menu: | Home • | Manuals • | Procedures • | Training • | Other • | Contact ► | For: | VO managers • | Administrators |
Security
Day to day operational security issues are handled by EGI-CSIRT IRTF [1]. Sites facing or suspecting a security incidents on their resources should encouraged to contact IRTF according to the EGI security incident procedure.
New vulnerability issues of the middleware should be handled as defined in the EGI vulnerability issue handling procedure.
Details and up-to-date versions of these security procedures can be found at EGI-CSIRT wiki [2].