SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Assurance Requirements for
e-Infrastructure Services
Martin Hamilton
Loughborough University /
HPC Midlands
Cloudy With a Chance of Rootkits
Martin Hamilton
Loughborough University /
HPC Midlands
Topics
1. What is e-Infrastructure?
2. Barriers to Adoption
3. Opening Pandora’s Box

4. Conclusions
Topics
1. What is e-Infrastructure?
2. Barriers to Adoption
3. Opening Pandora’s Box

4. Conclusions
1. What is e-Infrastructure?
—Research community
context:
HPC, SKA, LHC, DLS, NGS
and other TLAs
—Industrial context:
TSB Catapults, BIS/EPSRC
supercomputer
centres, “on ramps” for
SMEs
1. What is e-Infrastructure?
[http://goo.gl/fIpA7R]
1. What is e-Infrastructure?
Case Study - HPC Midlands:
—BIS/EPSRC regional centre
—3,000 core supercomputer
—Expertise from Loughborough
University & University of
Leicester
—Software from leading ISVs
—Flexible usage model for use
by research and industry
1. What is e-Infrastructure?
Case Study - HPC Midlands:
—BIS/EPSRC regional centre
—3,000 core supercomputer
—Expertise from Loughborough
University & University of
Leicester
—Software from leading ISVs
—Flexible usage model for use
by research and industry
1. What is e-Infrastructure?
1. What is e-Infrastructure?
1. What is e-Infrastructure?
Not just HPC:
- Bioinformatics
- Diamond Light
Source, SKA etc
- Major capital kit at
Institutions
- But not just kit?
- Open Access Pubs
- Open Data
- Software
Topics
1. What is e-Infrastructure?
2. Barriers to Adoption
3. Opening Pandora’s Box

4. Conclusions
2. Barriers to Adoption

Picture credits: CC-BY-NC by Flickr user ladybeames; Peter Strutton, HPC Midlands
2. Barriers to Adoption - Awareness
equipment.data.ac.uk
Kit Catalogue™ – kitcatalogue.com

Key question:
What are the boundaries
of e-Infrastructure?
2. Barriers to Adoption - Awareness
2. Barriers to Adoption - Awareness
2. Barriers to Adoption - Awareness
2. Barriers to Adoption - Training
2. Barriers to Adoption - Training
- Typically supply led
- Inflexible timing
- Prohibitively
expensive for SMEs
- Ad-hoc engagement
with ISVs
- Where is the MOOC?
2. Barriers to Adoption - Assurance
Challenging
preconceptions:
—“Supercomputing is just for
rocket scientists”
—“Academic services are
inherently insecure”
—“Legal would never sign off
on anything like this”
—“It’s just too hard to satisfy
assurance requirements”
Photo credit: CC-BY-NC by Flickr user justin_case
2. Barriers to Adoption - Assurance
Challenging preconceptions:
—Common off-the-shelf packages
have HPC solver capability, e.g.
FLUENT, NASTRAN, MATLAB
—Pen testing / audit tools don’t
care if you are an academic site
—Locking systems down is hard
work – get over it
—FTSE100 firms’ have similar
requirements to research and
education organizations
Photo credit: CC-BY-NC by Flickr user justin_case
2. Barriers to Adoption - Assurance
Challenging preconceptions:
—Common off-the-shelf packages
have HPC solver capability, e.g.
FLUENT, NASTRAN, MATLAB
—Pen testing / audit tools don’t
care if you are an academic site
—Locking systems down is hard
work – get over it
—FTSE100 firms’ have similar
requirements to research and
education organizations
Photo credit: CC-BY-NC by Flickr user justin_case
Topics
1. What is e-Infrastructure?
2. Barriers to Adoption
3. Opening Pandora’s Box

4. Conclusions
3. Opening Pandora’s Box
3. Opening Pandora’s Box
—Who makes the agreement?
—Dedicated special purpose vehicle, spin-out
company, cost sharing groups, VAT exemption etc

—What does it look like?
—Guaranteed turnaround time?
—Reducing the friction

—Compliance challenges
—ISO 27002, CESG InfoSec, physical security (e.g.
LPS 1175), CIS audit tool, pen testing / auditing
3. Opening Pandora’s Box
—Who makes the agreement?
—Dedicated special purpose vehicle, spin-out
company, cost sharing groups, VAT exemption etc

—What does it look like?
—Guaranteed turnaround time?
—Reducing the friction

—Compliance challenges
—ISO 27002, CESG InfoSec, physical security (e.g.
LPS 1175), CIS audit tool, pen testing / auditing
3. Opening Pandora’s Box

Sample security audit tool output from http://benchmarks.cisecurity.org/
3. Opening Pandora’s Box
—Relationship with customer networks
—Firewall traversal, double NAT, outbound access to
service, inbound access to license servers, double
encryption? (VPN + ssh)

—What would root do?
—Remove unnecessary permissions, turn off unused
services, is command line access even necessary?

—Connectivity
—Online access vs. sneakernet, remote visualization
requirement, JANET connectivity + AAA support
through Moonshot
Topics
1. What is e-Infrastructure?
2. Barriers to Adoption
3. Opening Pandora’s Box

4. Conclusions
4. Conclusions

Photo credit CC-BY-NC Flickr user brianklug
4. Conclusions

Photo credit CC-BY-NC Flickr user brianklug
4. Conclusions
—More disciplined approach to contractual
relations, technical aspects of service provision
—Requirement for certain public sector data, e.g. NHS
patient records

—Similar considerations around regional shared
services as for generic “cloud” providers
—Opportunity to set common expectations around
levels and types of service
—Migration between service providers and marketplace
for e-Infrastructure services
Cloudy With a Chance of Rootkits
Martin Hamilton
@martin_hamilton
m.t.hamilton@lboro.ac.uk

Weitere ähnliche Inhalte

Ähnlich wie Cloudy with a Chance of Rootkits - Assurance Requirements for e-Infrastructure Services

Offensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agendaOffensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agendaShivamSharma909
 
Offensive cyber security engineer
Offensive cyber security engineerOffensive cyber security engineer
Offensive cyber security engineerShivamSharma909
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updatedInfosecTrain
 
e-Discovery_2_Cloud_v5
e-Discovery_2_Cloud_v5e-Discovery_2_Cloud_v5
e-Discovery_2_Cloud_v5Steve Markey
 
Cloud bursting methodology
Cloud bursting methodologyCloud bursting methodology
Cloud bursting methodologyJonathan Spindel
 
To Cloud or Not To Cloud
To Cloud or Not To CloudTo Cloud or Not To Cloud
To Cloud or Not To CloudMichael Yung
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfChinatu Uzuegbu
 
SplunkLive! Customer Presentation – UMCP
SplunkLive! Customer Presentation – UMCPSplunkLive! Customer Presentation – UMCP
SplunkLive! Customer Presentation – UMCPSplunk
 
IT is Innovation in Technology
IT is Innovation in TechnologyIT is Innovation in Technology
IT is Innovation in TechnologyMartin Hamilton
 
2015 04 bio it world
2015 04 bio it world2015 04 bio it world
2015 04 bio it worldChris Dwan
 
Managing Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your OrganizationManaging Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your OrganizationCharles Lim
 
Challenges in Practicing High Frequency Releases in Cloud Environments
Challenges in Practicing High Frequency Releases in Cloud Environments Challenges in Practicing High Frequency Releases in Cloud Environments
Challenges in Practicing High Frequency Releases in Cloud Environments Liming Zhu
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3ShivamSharma909
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course contentShivamSharma909
 
Future-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsFuture-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsSteven SIM Kok Leong
 
Grid Middleware – Principles, Practice and Potential
Grid Middleware – Principles, Practice and PotentialGrid Middleware – Principles, Practice and Potential
Grid Middleware – Principles, Practice and PotentialPaul Brebner
 

Ähnlich wie Cloudy with a Chance of Rootkits - Assurance Requirements for e-Infrastructure Services (20)

Offensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agendaOffensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agenda
 
Offensive cyber security engineer
Offensive cyber security engineerOffensive cyber security engineer
Offensive cyber security engineer
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updated
 
e-Discovery_2_Cloud_v5
e-Discovery_2_Cloud_v5e-Discovery_2_Cloud_v5
e-Discovery_2_Cloud_v5
 
Cloud bursting methodology
Cloud bursting methodologyCloud bursting methodology
Cloud bursting methodology
 
To cloud or not to cloud
To cloud or not to cloudTo cloud or not to cloud
To cloud or not to cloud
 
To Cloud or Not To Cloud
To Cloud or Not To CloudTo Cloud or Not To Cloud
To Cloud or Not To Cloud
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 
SplunkLive! Customer Presentation – UMCP
SplunkLive! Customer Presentation – UMCPSplunkLive! Customer Presentation – UMCP
SplunkLive! Customer Presentation – UMCP
 
IT is Innovation in Technology
IT is Innovation in TechnologyIT is Innovation in Technology
IT is Innovation in Technology
 
2015 04 bio it world
2015 04 bio it world2015 04 bio it world
2015 04 bio it world
 
Managing Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your OrganizationManaging Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your Organization
 
CompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and TricksCompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and Tricks
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
 
Thesis Defense MBI
Thesis Defense MBIThesis Defense MBI
Thesis Defense MBI
 
Challenges in Practicing High Frequency Releases in Cloud Environments
Challenges in Practicing High Frequency Releases in Cloud Environments Challenges in Practicing High Frequency Releases in Cloud Environments
Challenges in Practicing High Frequency Releases in Cloud Environments
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
Future-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsFuture-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical Threats
 
Grid Middleware – Principles, Practice and Potential
Grid Middleware – Principles, Practice and PotentialGrid Middleware – Principles, Practice and Potential
Grid Middleware – Principles, Practice and Potential
 

Mehr von Martin Hamilton

Keep taking the tablets? The graduation of the iPad generation
Keep taking the tablets? The graduation of the iPad generationKeep taking the tablets? The graduation of the iPad generation
Keep taking the tablets? The graduation of the iPad generationMartin Hamilton
 
The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018
The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018
The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018Martin Hamilton
 
The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...
The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...
The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...Martin Hamilton
 
Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...
Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...
Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...Martin Hamilton
 
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018From Blockchain to Brexit - edtech trends for 2018 - BETT 2018
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018Martin Hamilton
 
Martin Hamilton - Digital skills: You won't believe what happened next!
Martin Hamilton - Digital skills: You won't believe what happened next!Martin Hamilton - Digital skills: You won't believe what happened next!
Martin Hamilton - Digital skills: You won't believe what happened next!Martin Hamilton
 
Martin Hamilton - Librarians in Outer Space - CILIP invited talk
Martin Hamilton - Librarians in Outer Space - CILIP invited talkMartin Hamilton - Librarians in Outer Space - CILIP invited talk
Martin Hamilton - Librarians in Outer Space - CILIP invited talkMartin Hamilton
 
Martin Hamilton - The impact of technology on the higher education sector - L...
Martin Hamilton - The impact of technology on the higher education sector - L...Martin Hamilton - The impact of technology on the higher education sector - L...
Martin Hamilton - The impact of technology on the higher education sector - L...Martin Hamilton
 
Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...
Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...
Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...Martin Hamilton
 
Martin Hamilton - What did your AI make today? - BCS invited talk
Martin Hamilton - What did your AI make today? - BCS invited talkMartin Hamilton - What did your AI make today? - BCS invited talk
Martin Hamilton - What did your AI make today? - BCS invited talkMartin Hamilton
 
Blockchain in research and education - UKSG Webinar - September 2017
Blockchain in research and education - UKSG Webinar - September 2017Blockchain in research and education - UKSG Webinar - September 2017
Blockchain in research and education - UKSG Webinar - September 2017Martin Hamilton
 
HPC in the cloud comes of age - Red Oak HPC Seminar
HPC in the cloud comes of age - Red Oak HPC SeminarHPC in the cloud comes of age - Red Oak HPC Seminar
HPC in the cloud comes of age - Red Oak HPC SeminarMartin Hamilton
 
Imagining Mars University - Universities UK 2017 conference
Imagining Mars University - Universities UK 2017 conferenceImagining Mars University - Universities UK 2017 conference
Imagining Mars University - Universities UK 2017 conferenceMartin Hamilton
 
Back to the future - Future Proof IT 2017
Back to the future - Future Proof IT 2017Back to the future - Future Proof IT 2017
Back to the future - Future Proof IT 2017Martin Hamilton
 
Tech in exams - SQA Assessment Expert Group - June 2017
Tech in exams - SQA Assessment Expert Group - June 2017Tech in exams - SQA Assessment Expert Group - June 2017
Tech in exams - SQA Assessment Expert Group - June 2017Martin Hamilton
 
Through the Overton Window - Health Education England horizon scanning worksh...
Through the Overton Window - Health Education England horizon scanning worksh...Through the Overton Window - Health Education England horizon scanning worksh...
Through the Overton Window - Health Education England horizon scanning worksh...Martin Hamilton
 
A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...
A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...
A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...Martin Hamilton
 
Help! My robot is a teacher! - Future Edtech 2017
Help! My robot is a teacher! - Future Edtech 2017Help! My robot is a teacher! - Future Edtech 2017
Help! My robot is a teacher! - Future Edtech 2017Martin Hamilton
 
Towards a UK Edtech Strategy - Edtech Vision 2020
Towards a UK Edtech Strategy - Edtech Vision 2020Towards a UK Edtech Strategy - Edtech Vision 2020
Towards a UK Edtech Strategy - Edtech Vision 2020Martin Hamilton
 
Bridging the digital divide - Digital Skills Summit 2017
Bridging the digital divide - Digital Skills Summit 2017Bridging the digital divide - Digital Skills Summit 2017
Bridging the digital divide - Digital Skills Summit 2017Martin Hamilton
 

Mehr von Martin Hamilton (20)

Keep taking the tablets? The graduation of the iPad generation
Keep taking the tablets? The graduation of the iPad generationKeep taking the tablets? The graduation of the iPad generation
Keep taking the tablets? The graduation of the iPad generation
 
The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018
The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018
The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018
 
The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...
The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...
The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...
 
Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...
Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...
Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...
 
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018From Blockchain to Brexit - edtech trends for 2018 - BETT 2018
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018
 
Martin Hamilton - Digital skills: You won't believe what happened next!
Martin Hamilton - Digital skills: You won't believe what happened next!Martin Hamilton - Digital skills: You won't believe what happened next!
Martin Hamilton - Digital skills: You won't believe what happened next!
 
Martin Hamilton - Librarians in Outer Space - CILIP invited talk
Martin Hamilton - Librarians in Outer Space - CILIP invited talkMartin Hamilton - Librarians in Outer Space - CILIP invited talk
Martin Hamilton - Librarians in Outer Space - CILIP invited talk
 
Martin Hamilton - The impact of technology on the higher education sector - L...
Martin Hamilton - The impact of technology on the higher education sector - L...Martin Hamilton - The impact of technology on the higher education sector - L...
Martin Hamilton - The impact of technology on the higher education sector - L...
 
Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...
Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...
Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...
 
Martin Hamilton - What did your AI make today? - BCS invited talk
Martin Hamilton - What did your AI make today? - BCS invited talkMartin Hamilton - What did your AI make today? - BCS invited talk
Martin Hamilton - What did your AI make today? - BCS invited talk
 
Blockchain in research and education - UKSG Webinar - September 2017
Blockchain in research and education - UKSG Webinar - September 2017Blockchain in research and education - UKSG Webinar - September 2017
Blockchain in research and education - UKSG Webinar - September 2017
 
HPC in the cloud comes of age - Red Oak HPC Seminar
HPC in the cloud comes of age - Red Oak HPC SeminarHPC in the cloud comes of age - Red Oak HPC Seminar
HPC in the cloud comes of age - Red Oak HPC Seminar
 
Imagining Mars University - Universities UK 2017 conference
Imagining Mars University - Universities UK 2017 conferenceImagining Mars University - Universities UK 2017 conference
Imagining Mars University - Universities UK 2017 conference
 
Back to the future - Future Proof IT 2017
Back to the future - Future Proof IT 2017Back to the future - Future Proof IT 2017
Back to the future - Future Proof IT 2017
 
Tech in exams - SQA Assessment Expert Group - June 2017
Tech in exams - SQA Assessment Expert Group - June 2017Tech in exams - SQA Assessment Expert Group - June 2017
Tech in exams - SQA Assessment Expert Group - June 2017
 
Through the Overton Window - Health Education England horizon scanning worksh...
Through the Overton Window - Health Education England horizon scanning worksh...Through the Overton Window - Health Education England horizon scanning worksh...
Through the Overton Window - Health Education England horizon scanning worksh...
 
A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...
A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...
A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...
 
Help! My robot is a teacher! - Future Edtech 2017
Help! My robot is a teacher! - Future Edtech 2017Help! My robot is a teacher! - Future Edtech 2017
Help! My robot is a teacher! - Future Edtech 2017
 
Towards a UK Edtech Strategy - Edtech Vision 2020
Towards a UK Edtech Strategy - Edtech Vision 2020Towards a UK Edtech Strategy - Edtech Vision 2020
Towards a UK Edtech Strategy - Edtech Vision 2020
 
Bridging the digital divide - Digital Skills Summit 2017
Bridging the digital divide - Digital Skills Summit 2017Bridging the digital divide - Digital Skills Summit 2017
Bridging the digital divide - Digital Skills Summit 2017
 

Kürzlich hochgeladen

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Cloudy with a Chance of Rootkits - Assurance Requirements for e-Infrastructure Services

  • 1. Assurance Requirements for e-Infrastructure Services Martin Hamilton Loughborough University / HPC Midlands
  • 2. Cloudy With a Chance of Rootkits Martin Hamilton Loughborough University / HPC Midlands
  • 3. Topics 1. What is e-Infrastructure? 2. Barriers to Adoption 3. Opening Pandora’s Box 4. Conclusions
  • 4. Topics 1. What is e-Infrastructure? 2. Barriers to Adoption 3. Opening Pandora’s Box 4. Conclusions
  • 5. 1. What is e-Infrastructure? —Research community context: HPC, SKA, LHC, DLS, NGS and other TLAs —Industrial context: TSB Catapults, BIS/EPSRC supercomputer centres, “on ramps” for SMEs
  • 6. 1. What is e-Infrastructure? [http://goo.gl/fIpA7R]
  • 7. 1. What is e-Infrastructure? Case Study - HPC Midlands: —BIS/EPSRC regional centre —3,000 core supercomputer —Expertise from Loughborough University & University of Leicester —Software from leading ISVs —Flexible usage model for use by research and industry
  • 8. 1. What is e-Infrastructure? Case Study - HPC Midlands: —BIS/EPSRC regional centre —3,000 core supercomputer —Expertise from Loughborough University & University of Leicester —Software from leading ISVs —Flexible usage model for use by research and industry
  • 9. 1. What is e-Infrastructure?
  • 10. 1. What is e-Infrastructure?
  • 11. 1. What is e-Infrastructure? Not just HPC: - Bioinformatics - Diamond Light Source, SKA etc - Major capital kit at Institutions - But not just kit? - Open Access Pubs - Open Data - Software
  • 12. Topics 1. What is e-Infrastructure? 2. Barriers to Adoption 3. Opening Pandora’s Box 4. Conclusions
  • 13. 2. Barriers to Adoption Picture credits: CC-BY-NC by Flickr user ladybeames; Peter Strutton, HPC Midlands
  • 14. 2. Barriers to Adoption - Awareness equipment.data.ac.uk Kit Catalogue™ – kitcatalogue.com Key question: What are the boundaries of e-Infrastructure?
  • 15. 2. Barriers to Adoption - Awareness
  • 16. 2. Barriers to Adoption - Awareness
  • 17. 2. Barriers to Adoption - Awareness
  • 18. 2. Barriers to Adoption - Training
  • 19. 2. Barriers to Adoption - Training - Typically supply led - Inflexible timing - Prohibitively expensive for SMEs - Ad-hoc engagement with ISVs - Where is the MOOC?
  • 20. 2. Barriers to Adoption - Assurance Challenging preconceptions: —“Supercomputing is just for rocket scientists” —“Academic services are inherently insecure” —“Legal would never sign off on anything like this” —“It’s just too hard to satisfy assurance requirements” Photo credit: CC-BY-NC by Flickr user justin_case
  • 21. 2. Barriers to Adoption - Assurance Challenging preconceptions: —Common off-the-shelf packages have HPC solver capability, e.g. FLUENT, NASTRAN, MATLAB —Pen testing / audit tools don’t care if you are an academic site —Locking systems down is hard work – get over it —FTSE100 firms’ have similar requirements to research and education organizations Photo credit: CC-BY-NC by Flickr user justin_case
  • 22. 2. Barriers to Adoption - Assurance Challenging preconceptions: —Common off-the-shelf packages have HPC solver capability, e.g. FLUENT, NASTRAN, MATLAB —Pen testing / audit tools don’t care if you are an academic site —Locking systems down is hard work – get over it —FTSE100 firms’ have similar requirements to research and education organizations Photo credit: CC-BY-NC by Flickr user justin_case
  • 23. Topics 1. What is e-Infrastructure? 2. Barriers to Adoption 3. Opening Pandora’s Box 4. Conclusions
  • 25. 3. Opening Pandora’s Box —Who makes the agreement? —Dedicated special purpose vehicle, spin-out company, cost sharing groups, VAT exemption etc —What does it look like? —Guaranteed turnaround time? —Reducing the friction —Compliance challenges —ISO 27002, CESG InfoSec, physical security (e.g. LPS 1175), CIS audit tool, pen testing / auditing
  • 26. 3. Opening Pandora’s Box —Who makes the agreement? —Dedicated special purpose vehicle, spin-out company, cost sharing groups, VAT exemption etc —What does it look like? —Guaranteed turnaround time? —Reducing the friction —Compliance challenges —ISO 27002, CESG InfoSec, physical security (e.g. LPS 1175), CIS audit tool, pen testing / auditing
  • 27. 3. Opening Pandora’s Box Sample security audit tool output from http://benchmarks.cisecurity.org/
  • 28. 3. Opening Pandora’s Box —Relationship with customer networks —Firewall traversal, double NAT, outbound access to service, inbound access to license servers, double encryption? (VPN + ssh) —What would root do? —Remove unnecessary permissions, turn off unused services, is command line access even necessary? —Connectivity —Online access vs. sneakernet, remote visualization requirement, JANET connectivity + AAA support through Moonshot
  • 29. Topics 1. What is e-Infrastructure? 2. Barriers to Adoption 3. Opening Pandora’s Box 4. Conclusions
  • 30. 4. Conclusions Photo credit CC-BY-NC Flickr user brianklug
  • 31. 4. Conclusions Photo credit CC-BY-NC Flickr user brianklug
  • 32. 4. Conclusions —More disciplined approach to contractual relations, technical aspects of service provision —Requirement for certain public sector data, e.g. NHS patient records —Similar considerations around regional shared services as for generic “cloud” providers —Opportunity to set common expectations around levels and types of service —Migration between service providers and marketplace for e-Infrastructure services
  • 33. Cloudy With a Chance of Rootkits Martin Hamilton @martin_hamilton m.t.hamilton@lboro.ac.uk