SlideShare a Scribd company logo
1 of 35
Download to read offline
https://aarc-project.eu
Authentication and Authorisation for Research and Collaboration
Hannah Short
Kantara
Addressing Federated Security Incident Response
AARC Assurance Profiles
April 7th, 2016
CERN
hannah.short@cern.ch
https://aarc-project.eu
The AARC Project
Policy & Best Practice Harmonisation Work Package
Assurance Gaps
• Minimum LoA
• Sirtfi
Recording Adoption
• Self Assessment
2
Agenda
https://aarc-project.eu
• Authorisation and Authentication for Research and Collaboration
• European Commission funded project
• 2 years, 2015/17
• 20 partners from NRENs, E-Infrastructures & Libraries
• Builds on existing AAIs and on production federated
infrastructures.
3
AARC
The AARC vision is to create a
future in which e-Infrastructures
and new research collaborations
cooperate seamlessly on top of a
scalable and interoperable AAI.
https://aarc-project.eu
https://aarc-project.eu
• Global scope, though Europe-focused
• Many moving parts…
• Must ensure any policy adoption/technical changes are:
• Easy to adopt
• Legally acceptable
• Financially beneficial/neutral
• AARC2 proposal submitted
• 2017/19
• 27 partners (so growing!)
• Focus on users
4
AARC
https://aarc-project.eu
5
AARC
https://aarc-project.eu
Policy and best practices harmonisation
What does assurance mean? And to whom?
How much differentiation of LoA can people handle?
What’s a sustainable distribution of 

responsibilities amongst AAI participants?
What is the place of third-party 

commercial and eGov providers?
How does that help guest identity?
How can we share necessary accountin
How can we address incidents that 

propagate through the federated space
Can we get policy coordination to scale?
Credit to David Groep (Nikhef) for this slide
https://aarc-project.eu
• Tasks chosen around
perceived policy gaps
• Areas identified jointly by 

e-infrastructures, research
infrastructures and NRENs
7
Policy and best practices harmonisation
Delivery of an
assurance
baseline and
differentiated
assurance
framework;
Identify a
minimal set of
policies to
enable attribute
aggregation;
Explore policy
and security
aspects to
enable the
integration of
attribute
providers and of
credential
translation
services;
Enable
consistent
handling of
security
incidents when
federated access
is enabled;Develop support
models for
(inter)federated
access to
commercial
services;
Develop
guidelines to
enable exchange
of accounting
and usage data.
https://aarc-project.eu
Common
Baseline
Level of
Assurance
• Multiple
LoA profiles
exist but
Security
Incident
Response
• Can we
facilitate
collaborati
ve incident 8
Policy and best practices harmonisation

Assurance Gaps
https://aarc-project.eu
• Interviewed 6 research infrastructures
• CLARIN (language research)
• DARIAH (arts and humanities)
• ELIXIR (life science)
• LIGO (physics)
• photon/neutron facilities (physics)
• WLCG (physics)
• Interviewed 2 e-infrastructures
• EGI
• PRACE
• Interview results: https://wiki.geant.org/x/nQHbAg
9
Minimum LoA 

Research community interviews
Credit to Mikael Linden for this slide
https://aarc-project.eu
1. The accounts in the Home Organisations must each
belong to a known individual
2. Persistent user identifiers (i.e., no reassign of user
identifiers)
3. Documented identity vetting procedures (not
necessarily face-to-face)
4. Password authentication (with some good practices)
5. Departing user’s eduPersonAffiliation must change
promptly
6. Self-assessment (supported with specific guidelines)
The document: https://wiki.geant.org/x/wIEVAw
10
Minimum LoA

Interview results
Credit to Mikael Linden for this slide
https://aarc-project.eu
• REFEDS working group
• Likely that each minimum LoA requirement will be a separate
Entity Category
11
Minimum LoA

Next steps
https://aarc-project.eu
12
Policy and best practices harmonisation

The chain of assurance
Authenticator
s
Identity
vetting
IdM Policy
Attribute release
Federation contract
Trust marks & categories
Confederation
‘eduGAIN’
Federation contract
Data protection & privacy
Data exchange
Infrastructure
Commons
representation

attribute source hiding
Incident Response
?
Credit to David Groep (Nikhef) for this slide
https://aarc-project.eu
• Clearly an inviting vector of attack
• The lack of a centralised support system for security incident
response is an identified risk to the success of eduGAIN
• We will need participants to collaborate during incident
response – this may be outside their remit
13
Security Incident Response

The problem
All I need
is one
account…
Federation 3
Federation 1
Federation 2
SP
SP
SP
SP
SP
SP
SP
SP
SP
SP
IdP
IdP
IdP
IdP
IdP
https://aarc-project.eu
IdP
SP
It all seems like common sense…
07/04/16 14
SP notices suspicious
jobs executed by a
handful of users from
an IdP
IdP identifies over
1000 compromised
accounts
Notifies IdP
IdP identifies all SPs
accessed
SP
SP
SP
Notifies SPs
https://aarc-project.eu
IdP
SP
… but in reality
07/04/16 15
SP notices suspicious
jobs executed by a
handful of users from
an IdP
IdP identifies over
1000 compromised
accounts
Notifies IdP
IdP identifies all SPs
accessed
SP
SP
SP
Notifies SPs
Large SP does not share
details of compromise, for
fear of damage to
reputation
Small IdP may not
have capability to
block users, or
trace their usage
SPs are not bound to abide by
confidentiality protocol and
disclose sensitive information
!
!
!
!
No security
contact
details!
X
X
X
X
https://aarc-project.eu
• Attacks inevitable ☹
• But we can make security capability transparent and build
relationships between organisations and people ☺
…We need a trust framework!
16
Security Incident Response

The solution
Inviting
new
vector of
attack
Uncertain
ty in
security
capability
of
participan
ts
Lack of
trust
https://aarc-project.eu
2012 2013 2014 2015 2016 2017 2018 2019
FIM4R Paper
Security for Collaborating
Infrastructures (SCI)
REFEDS Working Group
AARC
Sirtfi v1.0 Published
First Round Deployment
RFC
AARC2
Second Round Deployment
17
Security Incident Response

A history and the future
https://aarc-project.eu
• Issue of IdM raised by IT leaders from EIROforum labs (Jan
2011)
• CERN, EFDA-JET, EMBL, ESA, ESO, ESRF, European XFEL and ILL
• These laboratories, as well as national and regional research
organizations, face similar challenges
• Prepared a paper that documents common requirements
https://cdsweb.cern.ch/record/1442597
18
Security Incident Response

FIM4R
Credit to David Kelsey (STFC) for this content
“Such an identity federation in
the High Energy Physics (HEP)
community would rely on:
• A well-defined framework to
ensure sufficient trust and
security among the different
IdPs and relying parties.“
“Security procedures and incident response
would need to be reviewed. Today, each
resource provider is for example responsible for
terminating access by known compromised
identities. With identity federation, this
responsibility will be shifted to the IdP though
resource providers will insist on the ability to
revoke access.”
https://aarc-project.eu
Security Incident Response

Security for Collaborating Infrastructures (SCI)
• A collaborative activity of information security 

officers from large-scale infrastructures
• EGI, OSG, PRACE, EUDAT, CHAIN, 

WLCG, XSEDE, …
• Laid the foundations for a Trust framework
• Enable interoperation (security teams)
• Manage cross-infrastructure security risks
• Develop policy standards
• Especially where not able to share 

identical security policies
• Proceedings of the ISGC 2013 conference http://pos.sissa.it/
archive/conferences/179/011/ISGC%202013_011.pdf
19
Credit to David Kelsey (STFC) for this slide
https://aarc-project.eu
• The SCI document formed
the basis for the 

Security 

Incident 

Response 

Trust Framework for 

Federated 

Identity
20
Security Incident Response

Sirtfi
✓ Articulate framework
requirements
✓ Complete Community
Consultation
✓ Publish Sirtfi framework
✓ Create Training material
❑ Confirm metadata extensions
❑ Begin adoption
❑ Support filtering based on Sirtfi
https://aarc-project.eu
21
Security Incident Response

Sirtfi
Operational Security
• Require that a security incident response
capability exists with sufficient authority to
mitigate, contain the spread of, and
remediate the effects of an incident.
Incident Response
• Assure confidentiality of information
exchanged
• Identify trusted contacts
• Guarantee a response during collaboration
Traceability
• Improve the usefulness of logs
• Ensure logs are kept in accordance with
policy
Participant Responsibilities
• Confirm that end users are aware of an
appropriate AUP
https://aarc-project.eu
• Based on the InCommon security contactType
• What to include?
• Individual or group email contact? Recommend generic
• Telephone number in case critical infrastructure down? Would that really
help?
• PGP Key?
• The specification is flexible, section 2.3.2.2 of https://
docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-
os.pdf
22
Security Incident Response

Sirtfi, security contact details
Credit to David Groep (Nikhef) for this slide
<ContactPerson contactType="other" 

xmlns:icmd="http://refeds.org/metadata"
icmd:contactType="http://refeds.org/metadata/contactType/security">
<GivenName>Security Response Team</GivenName>

<EmailAddress>security@institution.edu</EmailAddress>

</ContactPerson>
https://aarc-project.eu
• Asserting compliance via standard OASIS specification
• Applied to register with IANA
23
Security Incident Response

Sirtfi, expressing compliance
<attr:EntityAttributes>

<saml:Attribute 

NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri" 

Name="urn:oasis:names:tc:SAML:attribute:assurance-certification”>

<saml:AttributeValue>https://refeds.org/sirtfi</
saml:AttributeValue> 

</saml:Attribute>

</attr:EntityAttributes> 
https://aarc-project.eu
24
Security Incident Response

Benefits of Sirtfi
IdPs
Gain access to useful
services that only allow
authentication from Sirtfi
compliant IdPs
SPs
Gain users whose home
organisations only allow
authentication at Sirtfi
compliant SPs
Guarantee an efficient and effective response from
partner organisations during incident response
Raise the bar in operational security across
eduGAIN
https://aarc-project.eu
25
Security Incident Response

Find out more – Home Page
https://refeds.org/sirtfi
https://aarc-project.eu
26
Security Incident Response

Find out more – Technical Wiki
https://wiki.refeds.org/display/SIRTFI/SIRTFI+Home
https://aarc-project.eu
Recording Adoption

Self Assessment
• Communities are happy with self assessment as long as the
group is relatively small
• The eduGAIN world is not small!
• Some use cases require peer review
• At a larger scale automation will be necessary
• How do we ensure the correct people complete the
assessment?
27
eduGAIN Stats
Federations: 38
All entities: 3157
IdPs: 2007
SPs: 1151
https://aarc-project.eu
Recording Adoption

Self Assessment
• Spinoff project from LoA/Sirtfi activities to develop a self
assessment tool*
• Optional Peer Review
• Integration with SAML Metadata
• Adoption Monitoring
• Feedback has been positive, 

but must ensure design scales
• Unclear how this tool will be 

developed, looking to the next 

round of AARC and GEANT 

Projects
28
* https://docs.google.com/document/d/10kguCdxWn38z_EGRnrdjCI4GSeO44zFGeXWHGmzz27o
https://aarc-project.eu
Conclusions
• The AARC Project aims to ensure that identity federation
succeeds, both in technologies and policies
• Measures to address perceived assurance gaps were included
in the Policies and Best Practices Harmonisation Work Package
• Community based interviews have defined a minimum
acceptable LoA, this will be the basis for an assurance profile
• There is a clear assurance gap in federated security, which is
being addressed by a trust framework
• A Self-Assessment tool would prove valuable for multiple use
cases to scale adoption
29
https://aarc-project.eu
30
Appendix, Sirtfi Assertions
https://aarc-project.eu
Operational security
• [OS1] Security patches in operating system and application
software are applied in a timely manner.
• [OS2] A process is used to manage vulnerabilities in software
operated by the organisation.
• [OS3] Mechanisms are deployed to detect possible intrusions
and protect information systems from significant and
immediate threats
• [OS4] A user’s access rights can be suspended, modified or
terminated in a timely manner.
• [OS5] Users and Service Owners (as defined by ITIL [ITIL])
within the organisation can be contacted.
• [OS6] A security incident response capability exists within the
organisation with sufficient authority to mitigate, contain the
spread of, and remediate the effects of a security incident.
06/04/16 31
https://aarc-project.eu
Incident response
• [IR1] Provide security incident response contact information as
may be requested by an R&E federation to which your
organization belongs.
• [IR2] Respond to requests for assistance with a security
incident from other organisations participating in the Sirtfi
trust framework in a timely manner.
• [IR3] Be able and willing to collaborate in the management of
a security incident with affected organisations that participate
in the Sirtfi trust framework.
• [IR4] Follow security incident response procedures established
for the organisation.
• [IR5] Respect user privacy as determined by the organisations
policies or legal counsel.
• [IR6] Respect and use the Traffic Light Protocol [TLP]
information disclosure policy.
06/04/16 32
https://aarc-project.eu
Traceability
• [TR1] Relevant system generated information, including accurate
timestamps and identifiers of system components and actors, are
retained and available for use in security incident response
procedures.
• [TR2] Information attested to in [TR1] is retained in conformance
with the organisation’s security incident response policy or
practices.
06/04/16 33
https://aarc-project.eu
Participant responsibilities
• [PR1] The participant has an Acceptable Use Policy (AUP).
• [PR2] There is a process to ensure that all users are aware
of and accept the requirement to abide by the AUP, for
example during a registration or renewal process.
06/04/16 34
https://aarc-project.eu
© GÉANT on behalf of the AARC project.
The work leading to these results has received funding from the European Union’s Horizon 2020 research and innovation programme under Grant Agreement No. 653965 (AARC).
Thank you
Any Questions?
https://aarc-project.eu
hannah.short@cern.ch

More Related Content

What's hot

Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus visionMarc Vael
 
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...Black Duck by Synopsys
 
Piacere general presentation
Piacere general presentationPiacere general presentation
Piacere general presentationPIACERE
 
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44Jisc
 
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...NetworkCollaborators
 
Preventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from CodePreventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from CodeDevOps.com
 
Stockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
Stockholm Internet Forum 2017: Development of CERTs in the Asia PacificStockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
Stockholm Internet Forum 2017: Development of CERTs in the Asia PacificAPNIC
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Black Duck by Synopsys
 
Learn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackLearn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackSSIMeetup
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT UpdatesAPNIC
 
Post IPv6 Implementation and Security: Now What?
Post IPv6 Implementation and Security: Now What?Post IPv6 Implementation and Security: Now What?
Post IPv6 Implementation and Security: Now What?Zivaro Inc
 
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...Synopsys Software Integrity Group
 
Buyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech ContractsBuyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech ContractsBlack Duck by Synopsys
 
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Synopsys Software Integrity Group
 
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CDSynopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CDSynopsys Software Integrity Group
 

What's hot (20)

Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus vision
 
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
 
Piacere general presentation
Piacere general presentationPiacere general presentation
Piacere general presentation
 
Webinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in ReviewWebinar–The 2019 Open Source Year in Review
Webinar–The 2019 Open Source Year in Review
 
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
 
Webinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for DevelopersWebinar–OWASP Top 10 for JavaScript for Developers
Webinar–OWASP Top 10 for JavaScript for Developers
 
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...Cisco Connect 2018 Malaysia -  Secure data center-building a secure zero-trus...
Cisco Connect 2018 Malaysia - Secure data center-building a secure zero-trus...
 
Preventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from CodePreventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from Code
 
Stockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
Stockholm Internet Forum 2017: Development of CERTs in the Asia PacificStockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
Stockholm Internet Forum 2017: Development of CERTs in the Asia Pacific
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
 
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
 
Learn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackLearn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stack
 
APCERT Updates
APCERT UpdatesAPCERT Updates
APCERT Updates
 
Post IPv6 Implementation and Security: Now What?
Post IPv6 Implementation and Security: Now What?Post IPv6 Implementation and Security: Now What?
Post IPv6 Implementation and Security: Now What?
 
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
 
ION Bangladesh - IETF Update
ION Bangladesh - IETF UpdateION Bangladesh - IETF Update
ION Bangladesh - IETF Update
 
ION Hangzhou - An IETF Journey for CNNIC
ION Hangzhou - An IETF Journey for CNNICION Hangzhou - An IETF Journey for CNNIC
ION Hangzhou - An IETF Journey for CNNIC
 
Buyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech ContractsBuyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech Contracts
 
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
Webinar–Is Your Software Security Supply Chain a Security Blind Spot?
 
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CDSynopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
 

Similar to AARC Assurance Profiles for Kantara Initiative

European Open Science Cloud: Concept, status and opportunities
European Open Science Cloud: Concept, status and opportunitiesEuropean Open Science Cloud: Concept, status and opportunities
European Open Science Cloud: Concept, status and opportunitiesEOSC-hub project
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_doolyzdooly
 
Cultivating Sustainable Software For Research
Cultivating Sustainable Software For ResearchCultivating Sustainable Software For Research
Cultivating Sustainable Software For ResearchNeil Chue Hong
 
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...Invest Northern Ireland
 
Prompting an EOSC in Practice, Isabel Campos, CSIC & Member of the High Level...
Prompting an EOSC in Practice, Isabel Campos, CSIC & Member of the High Level...Prompting an EOSC in Practice, Isabel Campos, CSIC & Member of the High Level...
Prompting an EOSC in Practice, Isabel Campos, CSIC & Member of the High Level...EOSC-hub project
 
The European Open Science Cloud: just what is it?
The European Open Science Cloud: just what is it?The European Open Science Cloud: just what is it?
The European Open Science Cloud: just what is it?Carole Goble
 
RDMkit, a Research Data Management Toolkit. Built by the Community for the ...
RDMkit, a Research Data Management Toolkit.  Built by the Community for the ...RDMkit, a Research Data Management Toolkit.  Built by the Community for the ...
RDMkit, a Research Data Management Toolkit. Built by the Community for the ...Carole Goble
 
Cloud Computing Needs for Earth Observation Data Analysis: EGI and EOSC-hub
Cloud Computing Needs for Earth Observation Data Analysis: EGI and EOSC-hubCloud Computing Needs for Earth Observation Data Analysis: EGI and EOSC-hub
Cloud Computing Needs for Earth Observation Data Analysis: EGI and EOSC-hubBjörn Backeberg
 
Responsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksResponsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksLiming Zhu
 
Quant - Interchain Development And Cross-Chain Protocols. BlockchainLive 2018
Quant - Interchain Development And Cross-Chain Protocols. BlockchainLive 2018Quant - Interchain Development And Cross-Chain Protocols. BlockchainLive 2018
Quant - Interchain Development And Cross-Chain Protocols. BlockchainLive 2018Gilbert Verdian
 
security_assessment_slides
security_assessment_slidessecurity_assessment_slides
security_assessment_slidesSteve Arnold
 
The Ascent of Open Science and the European Open Science Cloud
The Ascent of Open Science and the European Open Science CloudThe Ascent of Open Science and the European Open Science Cloud
The Ascent of Open Science and the European Open Science CloudTiziana Ferrari
 
PETRAS Hub Overview
PETRAS Hub OverviewPETRAS Hub Overview
PETRAS Hub OverviewIoTUK
 
Parallel session: trust and identity
Parallel session: trust and identityParallel session: trust and identity
Parallel session: trust and identityJisc
 
The e-Ciber Superfacility Project
The e-Ciber Superfacility ProjectThe e-Ciber Superfacility Project
The e-Ciber Superfacility ProjectLeandro Ciuffo
 
The European Open Science Cloud: just what is it?
The European Open Science Cloud: just what is it?The European Open Science Cloud: just what is it?
The European Open Science Cloud: just what is it?Jisc
 

Similar to AARC Assurance Profiles for Kantara Initiative (20)

European Open Science Cloud: Concept, status and opportunities
European Open Science Cloud: Concept, status and opportunitiesEuropean Open Science Cloud: Concept, status and opportunities
European Open Science Cloud: Concept, status and opportunities
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_dooly
 
Cultivating Sustainable Software For Research
Cultivating Sustainable Software For ResearchCultivating Sustainable Software For Research
Cultivating Sustainable Software For Research
 
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
 
ELIXIR TCG update
ELIXIR TCG updateELIXIR TCG update
ELIXIR TCG update
 
Prompting an EOSC in Practice, Isabel Campos, CSIC & Member of the High Level...
Prompting an EOSC in Practice, Isabel Campos, CSIC & Member of the High Level...Prompting an EOSC in Practice, Isabel Campos, CSIC & Member of the High Level...
Prompting an EOSC in Practice, Isabel Campos, CSIC & Member of the High Level...
 
The European Open Science Cloud: just what is it?
The European Open Science Cloud: just what is it?The European Open Science Cloud: just what is it?
The European Open Science Cloud: just what is it?
 
EOSC in practice - Silvana Muscella (chair EOSC HLEG)
EOSC in practice - Silvana Muscella (chair EOSC HLEG)EOSC in practice - Silvana Muscella (chair EOSC HLEG)
EOSC in practice - Silvana Muscella (chair EOSC HLEG)
 
An Introduction to Digital Preservation
An Introduction to Digital PreservationAn Introduction to Digital Preservation
An Introduction to Digital Preservation
 
RDMkit, a Research Data Management Toolkit. Built by the Community for the ...
RDMkit, a Research Data Management Toolkit.  Built by the Community for the ...RDMkit, a Research Data Management Toolkit.  Built by the Community for the ...
RDMkit, a Research Data Management Toolkit. Built by the Community for the ...
 
Cloud Computing Needs for Earth Observation Data Analysis: EGI and EOSC-hub
Cloud Computing Needs for Earth Observation Data Analysis: EGI and EOSC-hubCloud Computing Needs for Earth Observation Data Analysis: EGI and EOSC-hub
Cloud Computing Needs for Earth Observation Data Analysis: EGI and EOSC-hub
 
Responsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksResponsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risks
 
Blockchains and databases a new era in distributed computing
Blockchains and databases a new era in distributed computingBlockchains and databases a new era in distributed computing
Blockchains and databases a new era in distributed computing
 
Quant - Interchain Development And Cross-Chain Protocols. BlockchainLive 2018
Quant - Interchain Development And Cross-Chain Protocols. BlockchainLive 2018Quant - Interchain Development And Cross-Chain Protocols. BlockchainLive 2018
Quant - Interchain Development And Cross-Chain Protocols. BlockchainLive 2018
 
security_assessment_slides
security_assessment_slidessecurity_assessment_slides
security_assessment_slides
 
The Ascent of Open Science and the European Open Science Cloud
The Ascent of Open Science and the European Open Science CloudThe Ascent of Open Science and the European Open Science Cloud
The Ascent of Open Science and the European Open Science Cloud
 
PETRAS Hub Overview
PETRAS Hub OverviewPETRAS Hub Overview
PETRAS Hub Overview
 
Parallel session: trust and identity
Parallel session: trust and identityParallel session: trust and identity
Parallel session: trust and identity
 
The e-Ciber Superfacility Project
The e-Ciber Superfacility ProjectThe e-Ciber Superfacility Project
The e-Ciber Superfacility Project
 
The European Open Science Cloud: just what is it?
The European Open Science Cloud: just what is it?The European Open Science Cloud: just what is it?
The European Open Science Cloud: just what is it?
 

More from kantarainitiative

Kantara initiative - AGM 2022
Kantara initiative - AGM 2022Kantara initiative - AGM 2022
Kantara initiative - AGM 2022kantarainitiative
 
2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summarykantarainitiative
 
Kantara uma webinar july 2020
Kantara uma webinar   july 2020Kantara uma webinar   july 2020
Kantara uma webinar july 2020kantarainitiative
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15kantarainitiative
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15kantarainitiative
 
Kantara orientation april 2020
Kantara orientation april 2020Kantara orientation april 2020
Kantara orientation april 2020kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)kantarainitiative
 
Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 kantarainitiative
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Updatekantarainitiative
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAkantarainitiative
 

More from kantarainitiative (20)

Kantara initiative - AGM 2022
Kantara initiative - AGM 2022Kantara initiative - AGM 2022
Kantara initiative - AGM 2022
 
2021 Annual General Meeting
2021 Annual General Meeting2021 Annual General Meeting
2021 Annual General Meeting
 
2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary
 
2020 Annual General Meeting
2020 Annual General Meeting2020 Annual General Meeting
2020 Annual General Meeting
 
Kantara uma webinar july 2020
Kantara uma webinar   july 2020Kantara uma webinar   july 2020
Kantara uma webinar july 2020
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
 
Kantara orientation april 2020
Kantara orientation april 2020Kantara orientation april 2020
Kantara orientation april 2020
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara orientation 2018
Kantara orientation 2018Kantara orientation 2018
Kantara orientation 2018
 
Kantara Overview 2017
Kantara Overview 2017Kantara Overview 2017
Kantara Overview 2017
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
 
Cloud Identity Summit
Cloud Identity SummitCloud Identity Summit
Cloud Identity Summit
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
 
Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)
 
Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Update
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMA
 

Recently uploaded

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

AARC Assurance Profiles for Kantara Initiative

  • 1. https://aarc-project.eu Authentication and Authorisation for Research and Collaboration Hannah Short Kantara Addressing Federated Security Incident Response AARC Assurance Profiles April 7th, 2016 CERN hannah.short@cern.ch
  • 2. https://aarc-project.eu The AARC Project Policy & Best Practice Harmonisation Work Package Assurance Gaps • Minimum LoA • Sirtfi Recording Adoption • Self Assessment 2 Agenda
  • 3. https://aarc-project.eu • Authorisation and Authentication for Research and Collaboration • European Commission funded project • 2 years, 2015/17 • 20 partners from NRENs, E-Infrastructures & Libraries • Builds on existing AAIs and on production federated infrastructures. 3 AARC The AARC vision is to create a future in which e-Infrastructures and new research collaborations cooperate seamlessly on top of a scalable and interoperable AAI. https://aarc-project.eu
  • 4. https://aarc-project.eu • Global scope, though Europe-focused • Many moving parts… • Must ensure any policy adoption/technical changes are: • Easy to adopt • Legally acceptable • Financially beneficial/neutral • AARC2 proposal submitted • 2017/19 • 27 partners (so growing!) • Focus on users 4 AARC
  • 6. https://aarc-project.eu Policy and best practices harmonisation What does assurance mean? And to whom? How much differentiation of LoA can people handle? What’s a sustainable distribution of 
 responsibilities amongst AAI participants? What is the place of third-party 
 commercial and eGov providers? How does that help guest identity? How can we share necessary accountin How can we address incidents that 
 propagate through the federated space Can we get policy coordination to scale? Credit to David Groep (Nikhef) for this slide
  • 7. https://aarc-project.eu • Tasks chosen around perceived policy gaps • Areas identified jointly by 
 e-infrastructures, research infrastructures and NRENs 7 Policy and best practices harmonisation Delivery of an assurance baseline and differentiated assurance framework; Identify a minimal set of policies to enable attribute aggregation; Explore policy and security aspects to enable the integration of attribute providers and of credential translation services; Enable consistent handling of security incidents when federated access is enabled;Develop support models for (inter)federated access to commercial services; Develop guidelines to enable exchange of accounting and usage data.
  • 8. https://aarc-project.eu Common Baseline Level of Assurance • Multiple LoA profiles exist but Security Incident Response • Can we facilitate collaborati ve incident 8 Policy and best practices harmonisation
 Assurance Gaps
  • 9. https://aarc-project.eu • Interviewed 6 research infrastructures • CLARIN (language research) • DARIAH (arts and humanities) • ELIXIR (life science) • LIGO (physics) • photon/neutron facilities (physics) • WLCG (physics) • Interviewed 2 e-infrastructures • EGI • PRACE • Interview results: https://wiki.geant.org/x/nQHbAg 9 Minimum LoA 
 Research community interviews Credit to Mikael Linden for this slide
  • 10. https://aarc-project.eu 1. The accounts in the Home Organisations must each belong to a known individual 2. Persistent user identifiers (i.e., no reassign of user identifiers) 3. Documented identity vetting procedures (not necessarily face-to-face) 4. Password authentication (with some good practices) 5. Departing user’s eduPersonAffiliation must change promptly 6. Self-assessment (supported with specific guidelines) The document: https://wiki.geant.org/x/wIEVAw 10 Minimum LoA
 Interview results Credit to Mikael Linden for this slide
  • 11. https://aarc-project.eu • REFEDS working group • Likely that each minimum LoA requirement will be a separate Entity Category 11 Minimum LoA
 Next steps
  • 12. https://aarc-project.eu 12 Policy and best practices harmonisation
 The chain of assurance Authenticator s Identity vetting IdM Policy Attribute release Federation contract Trust marks & categories Confederation ‘eduGAIN’ Federation contract Data protection & privacy Data exchange Infrastructure Commons representation
 attribute source hiding Incident Response ? Credit to David Groep (Nikhef) for this slide
  • 13. https://aarc-project.eu • Clearly an inviting vector of attack • The lack of a centralised support system for security incident response is an identified risk to the success of eduGAIN • We will need participants to collaborate during incident response – this may be outside their remit 13 Security Incident Response
 The problem All I need is one account… Federation 3 Federation 1 Federation 2 SP SP SP SP SP SP SP SP SP SP IdP IdP IdP IdP IdP
  • 14. https://aarc-project.eu IdP SP It all seems like common sense… 07/04/16 14 SP notices suspicious jobs executed by a handful of users from an IdP IdP identifies over 1000 compromised accounts Notifies IdP IdP identifies all SPs accessed SP SP SP Notifies SPs
  • 15. https://aarc-project.eu IdP SP … but in reality 07/04/16 15 SP notices suspicious jobs executed by a handful of users from an IdP IdP identifies over 1000 compromised accounts Notifies IdP IdP identifies all SPs accessed SP SP SP Notifies SPs Large SP does not share details of compromise, for fear of damage to reputation Small IdP may not have capability to block users, or trace their usage SPs are not bound to abide by confidentiality protocol and disclose sensitive information ! ! ! ! No security contact details! X X X X
  • 16. https://aarc-project.eu • Attacks inevitable ☹ • But we can make security capability transparent and build relationships between organisations and people ☺ …We need a trust framework! 16 Security Incident Response
 The solution Inviting new vector of attack Uncertain ty in security capability of participan ts Lack of trust
  • 17. https://aarc-project.eu 2012 2013 2014 2015 2016 2017 2018 2019 FIM4R Paper Security for Collaborating Infrastructures (SCI) REFEDS Working Group AARC Sirtfi v1.0 Published First Round Deployment RFC AARC2 Second Round Deployment 17 Security Incident Response
 A history and the future
  • 18. https://aarc-project.eu • Issue of IdM raised by IT leaders from EIROforum labs (Jan 2011) • CERN, EFDA-JET, EMBL, ESA, ESO, ESRF, European XFEL and ILL • These laboratories, as well as national and regional research organizations, face similar challenges • Prepared a paper that documents common requirements https://cdsweb.cern.ch/record/1442597 18 Security Incident Response
 FIM4R Credit to David Kelsey (STFC) for this content “Such an identity federation in the High Energy Physics (HEP) community would rely on: • A well-defined framework to ensure sufficient trust and security among the different IdPs and relying parties.“ “Security procedures and incident response would need to be reviewed. Today, each resource provider is for example responsible for terminating access by known compromised identities. With identity federation, this responsibility will be shifted to the IdP though resource providers will insist on the ability to revoke access.”
  • 19. https://aarc-project.eu Security Incident Response
 Security for Collaborating Infrastructures (SCI) • A collaborative activity of information security 
 officers from large-scale infrastructures • EGI, OSG, PRACE, EUDAT, CHAIN, 
 WLCG, XSEDE, … • Laid the foundations for a Trust framework • Enable interoperation (security teams) • Manage cross-infrastructure security risks • Develop policy standards • Especially where not able to share 
 identical security policies • Proceedings of the ISGC 2013 conference http://pos.sissa.it/ archive/conferences/179/011/ISGC%202013_011.pdf 19 Credit to David Kelsey (STFC) for this slide
  • 20. https://aarc-project.eu • The SCI document formed the basis for the 
 Security 
 Incident 
 Response 
 Trust Framework for 
 Federated 
 Identity 20 Security Incident Response
 Sirtfi ✓ Articulate framework requirements ✓ Complete Community Consultation ✓ Publish Sirtfi framework ✓ Create Training material ❑ Confirm metadata extensions ❑ Begin adoption ❑ Support filtering based on Sirtfi
  • 21. https://aarc-project.eu 21 Security Incident Response
 Sirtfi Operational Security • Require that a security incident response capability exists with sufficient authority to mitigate, contain the spread of, and remediate the effects of an incident. Incident Response • Assure confidentiality of information exchanged • Identify trusted contacts • Guarantee a response during collaboration Traceability • Improve the usefulness of logs • Ensure logs are kept in accordance with policy Participant Responsibilities • Confirm that end users are aware of an appropriate AUP
  • 22. https://aarc-project.eu • Based on the InCommon security contactType • What to include? • Individual or group email contact? Recommend generic • Telephone number in case critical infrastructure down? Would that really help? • PGP Key? • The specification is flexible, section 2.3.2.2 of https:// docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0- os.pdf 22 Security Incident Response
 Sirtfi, security contact details Credit to David Groep (Nikhef) for this slide <ContactPerson contactType="other" 
 xmlns:icmd="http://refeds.org/metadata" icmd:contactType="http://refeds.org/metadata/contactType/security"> <GivenName>Security Response Team</GivenName>
 <EmailAddress>security@institution.edu</EmailAddress>
 </ContactPerson>
  • 23. https://aarc-project.eu • Asserting compliance via standard OASIS specification • Applied to register with IANA 23 Security Incident Response
 Sirtfi, expressing compliance <attr:EntityAttributes>
 <saml:Attribute 
 NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri" 
 Name="urn:oasis:names:tc:SAML:attribute:assurance-certification”>
 <saml:AttributeValue>https://refeds.org/sirtfi</ saml:AttributeValue> 
 </saml:Attribute>
 </attr:EntityAttributes> 
  • 24. https://aarc-project.eu 24 Security Incident Response
 Benefits of Sirtfi IdPs Gain access to useful services that only allow authentication from Sirtfi compliant IdPs SPs Gain users whose home organisations only allow authentication at Sirtfi compliant SPs Guarantee an efficient and effective response from partner organisations during incident response Raise the bar in operational security across eduGAIN
  • 25. https://aarc-project.eu 25 Security Incident Response
 Find out more – Home Page https://refeds.org/sirtfi
  • 26. https://aarc-project.eu 26 Security Incident Response
 Find out more – Technical Wiki https://wiki.refeds.org/display/SIRTFI/SIRTFI+Home
  • 27. https://aarc-project.eu Recording Adoption
 Self Assessment • Communities are happy with self assessment as long as the group is relatively small • The eduGAIN world is not small! • Some use cases require peer review • At a larger scale automation will be necessary • How do we ensure the correct people complete the assessment? 27 eduGAIN Stats Federations: 38 All entities: 3157 IdPs: 2007 SPs: 1151
  • 28. https://aarc-project.eu Recording Adoption
 Self Assessment • Spinoff project from LoA/Sirtfi activities to develop a self assessment tool* • Optional Peer Review • Integration with SAML Metadata • Adoption Monitoring • Feedback has been positive, 
 but must ensure design scales • Unclear how this tool will be 
 developed, looking to the next 
 round of AARC and GEANT 
 Projects 28 * https://docs.google.com/document/d/10kguCdxWn38z_EGRnrdjCI4GSeO44zFGeXWHGmzz27o
  • 29. https://aarc-project.eu Conclusions • The AARC Project aims to ensure that identity federation succeeds, both in technologies and policies • Measures to address perceived assurance gaps were included in the Policies and Best Practices Harmonisation Work Package • Community based interviews have defined a minimum acceptable LoA, this will be the basis for an assurance profile • There is a clear assurance gap in federated security, which is being addressed by a trust framework • A Self-Assessment tool would prove valuable for multiple use cases to scale adoption 29
  • 31. https://aarc-project.eu Operational security • [OS1] Security patches in operating system and application software are applied in a timely manner. • [OS2] A process is used to manage vulnerabilities in software operated by the organisation. • [OS3] Mechanisms are deployed to detect possible intrusions and protect information systems from significant and immediate threats • [OS4] A user’s access rights can be suspended, modified or terminated in a timely manner. • [OS5] Users and Service Owners (as defined by ITIL [ITIL]) within the organisation can be contacted. • [OS6] A security incident response capability exists within the organisation with sufficient authority to mitigate, contain the spread of, and remediate the effects of a security incident. 06/04/16 31
  • 32. https://aarc-project.eu Incident response • [IR1] Provide security incident response contact information as may be requested by an R&E federation to which your organization belongs. • [IR2] Respond to requests for assistance with a security incident from other organisations participating in the Sirtfi trust framework in a timely manner. • [IR3] Be able and willing to collaborate in the management of a security incident with affected organisations that participate in the Sirtfi trust framework. • [IR4] Follow security incident response procedures established for the organisation. • [IR5] Respect user privacy as determined by the organisations policies or legal counsel. • [IR6] Respect and use the Traffic Light Protocol [TLP] information disclosure policy. 06/04/16 32
  • 33. https://aarc-project.eu Traceability • [TR1] Relevant system generated information, including accurate timestamps and identifiers of system components and actors, are retained and available for use in security incident response procedures. • [TR2] Information attested to in [TR1] is retained in conformance with the organisation’s security incident response policy or practices. 06/04/16 33
  • 34. https://aarc-project.eu Participant responsibilities • [PR1] The participant has an Acceptable Use Policy (AUP). • [PR2] There is a process to ensure that all users are aware of and accept the requirement to abide by the AUP, for example during a registration or renewal process. 06/04/16 34
  • 35. https://aarc-project.eu © GÉANT on behalf of the AARC project. The work leading to these results has received funding from the European Union’s Horizon 2020 research and innovation programme under Grant Agreement No. 653965 (AARC). Thank you Any Questions? https://aarc-project.eu hannah.short@cern.ch