Alert.png The wiki is deprecated and due to be decommissioned by the end of September 2022.
The content is being migrated to other supports, new updates will be ignored and lost.
If needed you can get in touch with EGI SDIS team using operations @ egi.eu.

SEC03 EGI-CSIRT Critical Vulnerability Handling

From EGIWiki
Revision as of 12:26, 16 July 2015 by Sveng (talk | contribs) (→‎Steps)
Jump to navigation Jump to search
Main EGI.eu operations services Support Documentation Tools Activities Performance Technology Catch-all Services Resource Allocation Security


Documentation menu: Home Manuals Procedures Training Other Contact For: VO managers Administrators


Title EGI-CSIRT Critical Vulnerability Handling
Document link https://documents.egi.eu/public/ShowDocument?docid=283&version=7
Last modified 8
Policy Group Acronym EGI-CSIRT
Policy Group Name EGI-CSIRT
Contact Group csirt@mailman.egi.eu
Document Status DRAFT
Approved Date
Procedure Statement The scope of this procedure is to maintain a properly patched infrastructure and make sure that CRITICAL Vulnerabilities are handled adequately by all involved entities.
Owner Owner of procedure


Overview

After a problem has been assessed as critical, and a solution is available then sites are required to take action. This document primarily defines the procedure from this time, where sites are asked to take action, and what steps are taken if they do not respond or do not take action. If a site fails to take action, this may lead to site suspension.

Definitions

Please refer to the EGI Glossary for the definitions of the terms used in this procedure.

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", “MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119.

Entities involved in the procedure

  • SVG: svg-rat at mailman.egi.eu
  • EGI-CSIRT: csirt at mailman.egi.eu
  • NGI-Security-Officer: ngi-security-contacts at mailman.egi.eu
  • Resource Center Security Contact: as defined in goc-db

Requirements

This procedure applies to Vulnerabilities assessed as CRITICAL by SVG. The assessment process and the resulting required steps to handle vulnerablities is described in: described in the Vulnerability issue handling process.

Steps

The following table describes

Step#
Responsible Action Prerequisites, if any
1
EGI-CSIRT Issue advisory on resolution / mitigation of the risk arising from the Vulnerability in question. SVG and/or EGI-CSIRT assessed the vulnerability as CRITICAL

Revision History

Version Authors Date Comments