Alert.png The wiki is deprecated and due to be decommissioned by the end of September 2022.
The content is being migrated to other supports, new updates will be ignored and lost.
If needed you can get in touch with EGI SDIS team using operations @ egi.eu.

Difference between revisions of "SPG:Drafts:Virtual Machines Endorsement Policy March 2015"

From EGIWiki
Jump to navigation Jump to search
(SPG meeting March 2015)
 
(7 intermediate revisions by the same user not shown)
Line 4: Line 4:
This draft policy is currently under review. The previous adopted version of the text may be seen at https://documents.egi.eu/public/ShowDocument?docid=771
This draft policy is currently under review. The previous adopted version of the text may be seen at https://documents.egi.eu/public/ShowDocument?docid=771


As a result of the March 2015 SPG meeting, there was an item to work on an update of this policy to address the requirements from the EGI Federated Clouds folks.
 


=== Introduction ===
=== Introduction ===


'''THIS VERSION WAS PRODUCED DURING THE EGI SPG MEETING IN MARCH 2015'''
This policy is effective from <DATE> and replaces an earlier version of this document [R1]. This policy is one of a set of documents that together define the Security Policy [R2]. This individual document must be considered in conjunction with all the policy documents in the set.


This document describes the security-related policy requirements for the generation, distribution and operations of virtual machine (VM) images, as part of a trusted computing environment of the IT infrastructure.
This document describes the security-related policy requirements for the generation, distribution and operation of virtual machine (VM) images, as part of a trusted computing environment of the Infrastructure.


The aim is to enable VM images to be generated according to best practices and to be both trusted and operated elsewhere.
The aim is to enable VM images to be generated according to best practices and to be both trusted and operated elsewhere.


This policy does not compel resource centres to instantiate images endorsed in accordance with this policy. Should a resource centre decide to instanciate a VM image generated by any other non-compliant procedures, that resource centre is still bound by all applicable security policies and is required to consider the security implications of such an action on other participants.  
This policy does not compel resource centres to instantiate images endorsed in accordance with this policy. Should a resource centre decide to instantiate a VM image generated by any other non-compliant procedures, that resource centre is still bound by all applicable security policies and is required to consider the security implications of such an action on other participants.  


=== Definitions ===
=== Definitions ===
Line 52: Line 52:
By acting as a VM Operator you agree to the conditions laid down in this document and other referenced documents, which may be revised from time to time.
By acting as a VM Operator you agree to the conditions laid down in this document and other referenced documents, which may be revised from time to time.


# You are responsible to fulfil all the operational security and incident response requirements expressed in other policies
# You are responsible to fulfil all the operational security and incident response requirements expressed in other policies.
# You are responsible to ensure that any VM being run is compliant with existing security policies, including but not limited to security patching, vulnerability management, incident response, logging and traceability.
# You are responsible to ensure that any VM being run is compliant with existing security policies, including but not limited to security patching, vulnerability management, incident response, logging and traceability.
# You are responsible for handling all problems related to the execution of any licensed software in a VM image. You shall ensure that any software run in a VM, complies with applicable license conditions and you shall hold the resource centre running the image free and harmless from any liability with respect thereto.
# You are responsible for handling all problems related to the execution of any licensed software in a VM image. You shall ensure that any software run in a VM, complies with applicable license conditions and you shall hold the resource centre running the image free and harmless from any liability with respect thereto.
# You are responsible for the contextualisation of any instantiated VM image, including credentials and certificates and for its operation from that point on. If the VM image is endorsed then the instantiation may be considered to be trustworthy and all risks arising transfer to you at the time of contextualisation.
# If the VM image is endorsed then the instantiation may be considered to be trustworthy up to the point of contextualisation.
# You are responsible for the consequences of contextualisation of any instantiated VM image, including credentials and certificates and for the operation of the VM from that point on.  
# You are responsible for all lawful actions of the VM consumer.
# You are responsible for all lawful actions of the VM consumer.
# You recognise that the Infrastructure Organisation, the resource centres and the VOs reserve the right to block any endorsed image or terminate any instance of a virtual machine and associated user workload for administrative, operational or security reasons.
# You recognise that the Infrastructure Organisation, the resource centres and the VOs reserve the right to block any endorsed image or terminate any instance of a virtual machine and associated user workload for administrative, operational or security reasons.
Line 64: Line 65:
By acting as an Endorser you agree to the conditions laid down in this document and other referenced
By acting as an Endorser you agree to the conditions laid down in this document and other referenced
documents, which may be revised from time to time.
documents, which may be revised from time to time.
# You are held responsible by the infrastructure and by the resource centres for checking and confirming that a VM image has been produced according to the requirements of this policy and that there is no known reason, security-related or otherwise, why it should not be trusted.
# You are held responsible by all interested parties for checking and confirming that a VM image has been produced according to the requirements of this policy and that there is no known reason, security-related or otherwise, why it should not be trusted.
# You recognise that the VM must be generated according to current best practice, the details of which may be documented elsewhere by the infrastructure. These include but are not limited to:
# You recognise that the VM image must be generated according to current best practice, the details of which may be documented elsewhere by the infrastructure. These include but are not limited to:
## any image generation tool used must be fully patched and up to date;
## any image generation tool used must be fully patched and up to date;
## all operating system and other installed software security patches must be applied to all images and be up to date;
## all operating system and other installed software security patches must be applied to all images and be up to date;
## images are assumed to be world-readable and as such must not contain any confidential information;
## images are assumed to be world-readable and as such must not contain any confidential information;
## there should be no installed accounts, host/service private keys, ssh private keys or user credentials of any form in an image;
## images must not contain any installed accessible accounts or any other means of access;
## images must not contain any form of credential, such as passwords or private keys;
## images must be configured such that they do not prevent resource centres from meeting the finegrained monitoring and control requirements defined in the Security Traceability and Logging policy to allow for security incident response;
## images must be configured such that they do not prevent resource centres from meeting the finegrained monitoring and control requirements defined in the Security Traceability and Logging policy to allow for security incident response;
## the image must not prevent resource centres from implementing local authorisation and/or policy decisions, e.g. blocking the running of work for a particular user.
## the image must not prevent resource centres from implementing local authorisation and/or policy decisions, e.g. blocking the running of work for a particular user.
# You must disclose to the infrastructure or to any resource centre on request the procedures and practices you use for checking and endorsing images.
# You must disclose to any appropriate stakeholder on request the procedures and practices you use for checking and endorsing images.
# You must provide and maintain an up to date list of your currently endorsed images together with the metadata relating to each VM image. The related guidelines will be made available by the infrastucture organisation.
# You must provide and maintain an up to date list of your currently endorsed images together with the metadata relating to each VM image.
# Either the list or each individual image's metadata must be digitally signed by the endorser.
# Either the list or each individual image's metadata must be digitally signed by the endorser.
# You must keep an auditable history of every image endorsed including the date/time of generation and full list, including exact versions, of installed software and operating system contained in the VM. This must be made available to resource centres on demand.
# You must keep an auditable history of every image endorsed including the identity of the Endorser (individual not team), the date/time of generation and full list, including exact versions, of installed software and operating system contained in the VM. This must be made available to appropriate stakeholders on demand.
# You must implement a removal or revocation procedure to allow the VM operators to exclude those images which are no longer endorsed. This procedure must be implemented whenever a problem is found, e.g. a new security update is required. This removal must also be recorded locally in your auditable history.
# You must implement a removal or revocation procedure to allow the VM operators to exclude those images which are no longer endorsed. This procedure must be implemented whenever a relevant security update is required. This removal must also be recorded locally in your auditable history. Your responsibility for this revoked VM image ends at this point.
# You are responsible for handling all issues related to the distribution of any licensed software in a VM image. You shall ensure that any software distributed in a VM image, complies with applicable license conditions and you shall hold the resource centre running the image free and harmless from any liability with respect thereto.
# You are responsible for handling all issues related to the distribution of any licensed software in a VM image. You shall ensure that any software distributed in a VM image, complies with applicable license conditions and you shall hold the resource centre running the image free and harmless from any liability with respect thereto.
# You must assist the infrastructure in security incident response and must have a security vulnerability patching process in place.
# You must assist in security incident response and must have an appropriate security vulnerability patching process in place.
# You recognise that the infrastructure, the resource centres, and/or the VOs reserve the right to block any endorsed image or terminate any instance of a virtual machine and associated user workload for administrative, operational or security reasons.
# You recognise that if a VM operator runs an image which is no longer endorsed, you are not responsible for any consequences of this beyond the time of your removal of the endorsement.

Latest revision as of 16:01, 8 January 2016

Security Policy for the Endorsement and Operation of Virtual Machine Images

This draft policy is currently under review. The previous adopted version of the text may be seen at https://documents.egi.eu/public/ShowDocument?docid=771


Introduction

This policy is effective from <DATE> and replaces an earlier version of this document [R1]. This policy is one of a set of documents that together define the Security Policy [R2]. This individual document must be considered in conjunction with all the policy documents in the set.

This document describes the security-related policy requirements for the generation, distribution and operation of virtual machine (VM) images, as part of a trusted computing environment of the Infrastructure.

The aim is to enable VM images to be generated according to best practices and to be both trusted and operated elsewhere.

This policy does not compel resource centres to instantiate images endorsed in accordance with this policy. Should a resource centre decide to instantiate a VM image generated by any other non-compliant procedures, that resource centre is still bound by all applicable security policies and is required to consider the security implications of such an action on other participants.

Definitions

The following terms are defined.

  • Endorser: A role, held either by an individual or a team, who is responsible for confirming that a particular VM image has been produced according to the requirements of this policy and states that the image can be trusted. An Endorser should be one of a limited number of authorised and trusted individuals appointed either by the infrastructure, a VO or a resource centre. The appointing body must assume responsibility for the actions of the Endorser and must ensure that he/she is aware of the requirements of this policy.
  • VM operator: A role, held either by an individual or a team, who is responsible for the security of the VM during its operation phase, from the time it is instantiated, until it is terminated. Typically this addresses individuals with root access on the VM.
  • VM consumer: A role held by an individual who consumes with no level of management privilege the services operated on or by a VM.
  • Third party: An external entity other than the resource centre where the VM is operated.

Use case classification

The current policy document addresses the following use cases.

Endorser: resource centre, VM operator: resource centre

In this class virtualisation is not directly accessible by users. It includes, for example, the use of virtual worker nodes that act in a similar way to real worker nodes.

The resource centre is both the Endorser and the VM operator and is responsible to ensure the compliance of the VM with existing security policies.

Endorser: Third party, VM operator: resource centre

In this class, the resource centre is the VM operator, and the trust relationship is established between the resource centre and the Endorser.

Endorser: Third party, VM operator: Third Party

In this class, the resource centre runs the VM but is not the VM operator, and the trust relationship is established between:

  • the resource centre and the VM operator
  • the VM operator and the Endorser (both roles can be combined)

The resource centre is responsible to ensure sufficient traceability in order to enable malicious network activity to be linked with any VM and its VM operator, as defined in the Security Traceability and Logging policy.

The resource centre has no direct trust relationship with the Endorser and may decide to apply specific restrictions to control the access of the VM to other resources, including network services.

Policy Requirements on the VM Operator

By acting as a VM Operator you agree to the conditions laid down in this document and other referenced documents, which may be revised from time to time.

  1.  You are responsible to fulfil all the operational security and incident response requirements expressed in other policies.
  2.  You are responsible to ensure that any VM being run is compliant with existing security policies, including but not limited to security patching, vulnerability management, incident response, logging and traceability.
  3. You are responsible for handling all problems related to the execution of any licensed software in a VM image. You shall ensure that any software run in a VM, complies with applicable license conditions and you shall hold the resource centre running the image free and harmless from any liability with respect thereto.
  4. If the VM image is endorsed then the instantiation may be considered to be trustworthy up to the point of contextualisation.
  5. You are responsible for the consequences of contextualisation of any instantiated VM image, including credentials and certificates and for the operation of the VM from that point on.
  6. You are responsible for all lawful actions of the VM consumer.
  7. You recognise that the Infrastructure Organisation, the resource centres and the VOs reserve the right to block any endorsed image or terminate any instance of a virtual machine and associated user workload for administrative, operational or security reasons.


Policy Requirements on the Endorser

By acting as an Endorser you agree to the conditions laid down in this document and other referenced documents, which may be revised from time to time.

  1. You are held responsible by all interested parties for checking and confirming that a VM image has been produced according to the requirements of this policy and that there is no known reason, security-related or otherwise, why it should not be trusted.
  2. You recognise that the VM image must be generated according to current best practice, the details of which may be documented elsewhere by the infrastructure. These include but are not limited to:
    1. any image generation tool used must be fully patched and up to date;
    2. all operating system and other installed software security patches must be applied to all images and be up to date;
    3. images are assumed to be world-readable and as such must not contain any confidential information;
    4. images must not contain any installed accessible accounts or any other means of access;
    5. images must not contain any form of credential, such as passwords or private keys;
    6. images must be configured such that they do not prevent resource centres from meeting the finegrained monitoring and control requirements defined in the Security Traceability and Logging policy to allow for security incident response;
    7. the image must not prevent resource centres from implementing local authorisation and/or policy decisions, e.g. blocking the running of work for a particular user.
  3. You must disclose to any appropriate stakeholder on request the procedures and practices you use for checking and endorsing images.
  4. You must provide and maintain an up to date list of your currently endorsed images together with the metadata relating to each VM image.
  5. Either the list or each individual image's metadata must be digitally signed by the endorser.
  6. You must keep an auditable history of every image endorsed including the identity of the Endorser (individual not team), the date/time of generation and full list, including exact versions, of installed software and operating system contained in the VM. This must be made available to appropriate stakeholders on demand.
  7. You must implement a removal or revocation procedure to allow the VM operators to exclude those images which are no longer endorsed. This procedure must be implemented whenever a relevant security update is required. This removal must also be recorded locally in your auditable history. Your responsibility for this revoked VM image ends at this point.
  8. You are responsible for handling all issues related to the distribution of any licensed software in a VM image. You shall ensure that any software distributed in a VM image, complies with applicable license conditions and you shall hold the resource centre running the image free and harmless from any liability with respect thereto.
  9. You must assist in security incident response and must have an appropriate security vulnerability patching process in place.