/
Federated Federated

Federated - PowerPoint Presentation

celsa-spraggs
celsa-spraggs . @celsa-spraggs
Follow
387 views
Uploaded On 2016-04-13

Federated - PPT Presentation

Incident Response Jim Basney jbasneyillinoisedu Federated Incident Response Motivation Federated identity used for activities of consequence Access to NSF cyberinfrastructure TeraGrid ID: 280182

federated incident teragrid response incident federated response teragrid cic security net identity www access idmgmt illinois user information providers policies operational university

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Federated" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Federated Incident Response

Jim Basneyjbasney@illinois.eduSlide2

Federated Incident ResponseMotivation

Federated identity used for activities of consequenceAccess to NSF cyberinfrastructure (TeraGrid, …)Access to wireless networks (

eduroam, …)Access to federal grant management (NSF, NIH, …)

Access to commercial services (

Dreamspark

, …)

Effective security incident response in federated identity environments requires cross-organizational cooperation

Prepare now – stay ahead of the curveSlide3

CIC IDM WG TeraGrid PilotCommittee on Institutional Cooperation (www.cic.net

)Consortium of Big Ten universities plus U ChicagoU Nebraska joining July 2011CIC Identity Management Working Grouphttp://www.cic.net/Home/Projects/Technology/IdMgmt/Introduction.aspx

TeraGrid Pilot sub-groupCo-chairs: Von Welch, Keith Wessel (Illinois)Active participants: Jim Basney (Illinois), Michael Grady (Illinois), Matt Kolb (Michigan State), Rob Stanfield (Purdue)

Drafting a

Federated IDM Security Incident Response Policy

cic-it-idmgmt-teragrid@cic.net

Federated Incident ResponseSlide4

Federated Incident Response PolicyDraft documents at

http://www.cic.net/Home/Reports.aspxDoes not supplant existing local policies, but augments themDefines responsibilities and roles of identity providers, service providers, federation operators, and usersService providers have ultimate authority to protect and control access to their services

Federated Incident ResponseSlide5

Security Incident DefinedAn act of violating an explicit or implied security policy

ExamplesPassword theftComputer compromiseData privacy breach…

Federated Incident ResponseSlide6

Federated Incident Response Philosophy“Do for others as you would do for yourself.”

Treat a federated security incident like you would treat an internal security incidentPromptly acknowledge incident reportsInvestigate incidentsNotify affected parties when incidents are resolved

Notify affected parties and share relevant informationService Providers

Identity Providers

Federation Operators

Maintain the confidentiality of incident information

Keep audit logs to facilitate incident investigation

Federated Incident ResponseSlide7

Federated Incident Response ExampleUniversity Identity Provider + TeraGrid Service Provider

TeraGrid discovers account misuse caused by compromise of federated identityResponse processTeraGrid disables user accounts at TeraGrid sitesTeraGrid contacts University

University investigates, contacts user, resets user password, etc.University notifies TeraGrid when incident is resolvedTeraGrid re-enables user accounts at TeraGrid sites

F

ederated identity introduces need for coordination with home organization, rather than (just) direct interaction between TeraGrid security and TeraGrid users

Federated Incident ResponseSlide8

Proposed InCommon Operational ChangesAdd security incident response contact information to

Participant Operational Practices (POP) documentsInCommon metadataSecurity contact information can includeURL for incident response practices/policies and public keysEmail address

Telephone numberFederated Incident ResponseSlide9

For more information

cic-it-idmgmt-teragrid@cic.net

http://www.cic.net/Home/Projects/Technology/IdMgmt/Introduction.aspx

http://www.cic.net/Home/Reports.aspx

Federated Incident Response