SlideShare una empresa de Scribd logo
1 de 38
Descargar para leer sin conexión
Enabling Science with Trust and Security
Tom Barton
Sr Consultant for Cybersecurity & Data Privacy
UChicago & Internet2
GlobusWorld 2019
What I’ll tell you
• Security is all about enabling the mission by reducing risk to it
• There are security programs designed to reduce risk to research
• Trust frameworks reduce risk across complex cyberinfrastructure (CI)
ecosystems
• Trust frameworks & security enable scientific CI by reducing risk to it
• Some practical ways to engage with these
2
The simplest case
Human subjects research is perhaps the simplest example of security
enabling science.
Not that it’s easy!
3
4
Rigorous scientific methods
help civic partners achieve
the greatest social good
per dollar
Liability incurred by contracts and regulation
• Sensitive data provided under contract by external agencies
• Variety of security obligations in Data Use Agreements
• HIPAA Business Associate Agreements
• Government contracts with DFARS flow down requirements
• Federal security standards, focused on data confidentiality
• Also subject to state regulations protecting personal information
• Worst case: existential threat to associated research programs
5
Institutional strategy for secure research data
• Research Computing, Research Administration, Legal, IT partnership to
reduce risk to affected research
• Provide security as a service to PIs so they don’t have to figure it out
• Elements
• Risk assessment in grants & contracts processes
• Secure research computing service
• Dean and VP Research level policy governance
• Broad-based operational governance
• Federal security standards: NIST SP 800-53/800-171/CUI
• UChicago and many others have one or are moving in that direction
6
UChicago Secure Computing Environment
7
Benefits and dividends
• On-going close coordination between research computing and central IT
• Identity & access management
• Security operations, incident response and risk assessment
• Network engineering
• Storage/recovery
• Systems administration
• Central IT learned how to support other sensitive computing needs
• Re-usable building blocks of secure computing technologies and procedures
• Total institutional cost is reduced with each re-use
8
Can CISOs and Research Computing
Directors get along?
• Yes!
• "Enabling Trustworthy Campus Cyberinfrastructure for Science“
• Workshop by TrustedCI and InCommon, funded by NSF, September 2018
• Chief Information Security Officer and Research Computing Director teams from ~15
universities
• Secure research computing needs drive successful partnerships among
CISOs, RC Directors, Legal Counsel, Research Administration
• Regardless of where RC Director and CISO report, large or small
institution, centralized or decentralized
9
Review of the simplest case
The scientific CI is in one organization, which makes feasible:
• Close, on-going operational collaboration between research
computing, central IT, information security
• Implementation of Federal/NIST security standards
Enables human subjects research programs by providing the help
needed to address onerous security obligations
10
Security and risk
Must it always be about complying with Federal/NIST security
standards?
11
Security Defined by Merriam Webster
1: freedom from danger (safety), freedom from fear or anxiety
4: measures taken to guard against espionage or sabotage,
crime, attack, or escape
https://www.merriam-webster.com/dictionary/security
We should emphasize definition #1, but security practice is
traditionally focused on #4
12
slide credit: Von Welch
Data lost
System
unavailable
Data altered
Private data
exposed
Enforced
shutdown
Ransomware
Cyber espionage
Weaponization
Hactivism
Identity theft
Mal intent
Protective and
responsive measures
Prevent negative
impact
Extended
disruption
Cybersecurity – traditional view
13
CI system in designed state
Protective and
responsive measures
Data lost
System
unavailable
Data altered
Private data
exposed
Enforced
shutdown
Ransomware
Cyber espionage
Weaponization
Misconfiguration
Flaw in 3rd party component
system
Overlooked ancillary functions
remain active
System restored to unplanned
state
Uncaught data transport error
Inadequate incident response
capability
Lack of operational coordination
leaves system in unplanned stateHactivism
Identity theft
Mal intent Deltas to CI system design state Negative impact
Extended
disruption
Cyber Risk – it’s not just about bad actors
14
Federal security standards address some IT risks
15
IT risk Federal security
controls?
Misconfiguration Yes
Flaw in 3rd party component system Yes
Overlooked ancillary functions remain active Yes
System restored to unplanned state Yes
Lack of operational coordination leaves system in
unplanned state
No
Uncaught data transport error No
Inadequate incident response capability Yes
Will Federal security frameworks assimilate all
US scientific CI?
Yes
Appropriate, probably
unavoidable, for some
secure research
Some aspects well suited
to both open science and
secure research
No
Needs common executive management, hence
hard to apply across organizations
Some critical IT risks aren’t addressed
TrustedCI is developing alternatives for open
science
• Open Science Cyber Risk Profile
• Guide to Developing Cybersecurity Programs
for NSF Science and Engineering Projects
16
Lack of operational coordination
leaves system in unplanned state
Please hold this thought in mind for a few minutes….
17
A complex case
Trust Frameworks and Federation reduce risk in complex, multi-
organizational circumstances
18
19
Since 2015, thirteen ESFRI Research Infrastructures from the field of BioMedical Science
(BMS RI) joined their scientific capabilities and services to transform the understanding of
biological mechanisms and accelerate its translation into medical care.
• biobanking & biomolecular
resources
•curated databases
•marine model organisms
•systems biology
•translational research
•functional genomics
•screening & medicinal
chemistry
•microorganisms
•clinical trials
•structural biology
•biological/medical imaging•plant phenotyping
•highly pathogenic
microorganisms
Slide credit:
Mikael Linden
Increasing complexity of scientific CI
• Bigger data & bigger teams need bigger CI
• Beyond the scale a single organization can achieve on its own
• Not-bigger funding motivates the concentration of CI investments
• Federating or centralizing HPC centers, cloud
• Size brings complexity
• Federated user access, federated resources
• Access management
• Data, cache, and network management
20
As scientific CIs integrate more components and organizations, it’s
harder to manage, debug, and ascertain the state of the entire system
Federated user access – a global infrastucture
faculty, students, staff
data sets
intellectual property
specialized instruments
specialized computing
68 countries (March 2019)
> 16,700 entities (25% InCommon)
> 10,000,000 users
connected by global research
networks and federation
21
22
Get collaboration ready
Release “Research & Scholarship” attributes
Basic security for Identity Provider
Accurate & complete metdata for good user experience
Standard MFA request/response
Identity assurance info
Enable
basic collaboration
Support
high value resources
Protect
collaboration resources Reduce risk
Identity
Providers
implement
Academic
Service
Providers
implement
Each item in the bottom two tiers is associated with a trust framework,
as is the federation itself
InCommon progress on metadata (user experience)
23
24
InCommon’s Baseline Expectations program
Dimensions
❏ Security
❏ Privacy
❏ Transparency/Accountability
❏ User Experience
Participation Agreement
requires everyone to adhere
to Baseline Expectations
Processes
❏ Community Consensus
❏ Community Dispute Resolution
Mostly, it consists of tons of communication and help
Baseline Roadmap (under development)
25
1Q18 2Q18 3Q18 4Q18 1Q19 2Q19 3Q19 4Q19 1Q20 2Q20 3Q20 4Q20 1Q21 2Q21 3Q21 4Q21
Create BE processes, redo
contracts, metadata quality.
errorURL. SIRTFI all entities.
R&S and REFEDS MFA for
academic OS IdPs.
IdPs must use collaboration-
ready software/services.
Research & Scholarship attribute release
• Name, email, affiliation, persistent identifier
• Common need for “research and scholarship” services
• Those service providers are “tagged” by their national federation
operators as “R&S”
• Identity Providers automatically release the R&S attributes to R&S tagged
services
• Such Identity Providers are also tagged as “R&S” so that services can elect
to require R&S attributes in order to provide service
• The R&S program contributes to good privacy practice under the
European General Data Protection Regulation (GDPR)
[ 26 ]
SIRTFI - security incident response trust
framework for federated identity
27
Be willing to collaborate in
responding to a federated security
incident.
Apply basic operational security
protections to your federated
entities
in line with your organization’s
priorities.
Self-assert SIRTFI “tag” so that
others will know to trust this
about you.
REFEDS Assurance Framework
28
Identity Assurance Authentication Strength
Authentication
Single-factor
authentication (SFA)
Multi-factor
authentication (MFA)
Attributes
Affiliation freshness
1 day
Affiliation freshness
1 month
ID Proofing
Medium
(eg postal credential
delivery)
Low
(self-asserted)
High
(eg F2F)
Identifiers
ID is unique, personal
and traceable
ePPN is unique,
personal and
traceable
Defines a standard means for service providers to receive information about identity
assurance practice and request and receive information about strength of credentials
Review of the complex case & trust frameworks
A trust framework is
• A standard of behavior that applies to participants and/or components in
large, complex, even global systems
• Developed in response to identified needs of research and scholarly
activities
We trust that trust framework adopters reasonably observe the standard of
behavior because of our shared mission in Research & Education
Federations and other organizations enable and monitor trust framework
participation and may operate processes to verify or compel adoption
29
Lack of operational coordination
leaves system in unplanned state
Systems that integrate components across many organizations can use
trust frameworks to reduce the risk posed by intrinsic inability to
coordinate operationally
30
Reducing risk to scientific CI
Some services and programs you can take advantage of.
Some things you might think about doing.
31
ResearchSOC
ResearchSOC helps make scientific computing resilient to cyberattacks and
capable of supporting trustworthy, productive research.
• NSF funded center
• Indiana University, Duke University, Pittsburgh Supercomputing Center, University of
California San Diego
• Security Operations Center
• Vulnerability scanning and threat intelligence sharing
• Training information security professionals to address challenges of
securing research
32
TrustedCI and Internet2
• Direct engagements or partnerships to review or solve problems
• Security programs for NSF funded activities
• Facility/Site Identity & Access Management
• Federated user access
• Cloud use
• Campus Champions / CaRRC
• Science Gateways Community Institute
• Hope to translate experience with user federation into resource
federation space
33
Globus Connect/High Assurance
• Enhanced Connect Server/Personal to meet the security needs of
protected environments for secure research
• Only authorized identities
• Audit trails
• Session timeouts
• More…
• Enhanced Transfer & Auth services backend in AWS
• Meets Federal/NIST security standards
• Suited to HIPAA and other sensitive research data
34
You – campus research computing staff
• Add federated user access tooling to your environment
• CILogon, Globus Auth, COmanage, Grouper, others
• Help your CISO become your partner
• Support Federal security standards for high risk projects, sensible
security for low (eg, Open Science Cyber Risk Profile)
• Stay abreast of prototype resource federation efforts
• Help TrustedCI/Internet2 understand your researchers’ problems and
give guidance on good solutions
35
You – platform & gateway developers
• Use federated user access tooling
• Deep water, don’t roll your own user management!!
• Help your information security people to help you
• Bake sensible security into your dev and operational processes
• Provide sensible security functionality to deployers
• Your platforms are sometime implemented in very exposed Science
DMZs – focus on securing system integrity, make it hard for bad guys
to re-purposed as weapons
36
You - PIs
• Involve research computing staff as early as possible in grant
formulation process to optimize proposed data processing workflow
• If sensitive research data is involved, early engagement will minimize
hurdles & hoops, ensure satisfactory proposed data security plan
• Demand sensible security – make the IT and security powers that be
know that it matters and you need them for it
37
38
Thank you!
Questions?
tbarton@uchicago.edu

Más contenido relacionado

La actualidad más candente

Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItMarc Crudgington, MBA
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsIgnyte Assurance Platform
 
ComResource Agency Solutions
ComResource Agency SolutionsComResource Agency Solutions
ComResource Agency SolutionsAnthony Dials
 
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017Doug Copley
 
Cybersecurity Program Assessments
Cybersecurity Program AssessmentsCybersecurity Program Assessments
Cybersecurity Program AssessmentsJohn Anderson
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLPYun Lu
 
The Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security BreachThe Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security BreachCloudLock
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackMekhi Da ‘Quay Daniels
 
M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017EQS Group
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNorth Texas Chapter of the ISSA
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber riskStephen Cobb
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Peter1020
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 

La actualidad más candente (20)

Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 
Marc Crudgington Who I Am
Marc Crudgington Who I AmMarc Crudgington Who I Am
Marc Crudgington Who I Am
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
 
ComResource Agency Solutions
ComResource Agency SolutionsComResource Agency Solutions
ComResource Agency Solutions
 
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017
 
Cybersecurity Program Assessments
Cybersecurity Program AssessmentsCybersecurity Program Assessments
Cybersecurity Program Assessments
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
Healthcare and Cyber security
Healthcare and Cyber securityHealthcare and Cyber security
Healthcare and Cyber security
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
The Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security BreachThe Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security Breach
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of Attack
 
M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
 
DLP
DLPDLP
DLP
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 

Similar a Enabling Science with Trust and Security – Guest Keynote

Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation Technology Society Nepal
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskHealth Catalyst
 
PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?Lumension
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionPrecisely
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataPrecisely
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...acemindia
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gapxband
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMatthew Rosenquist
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehAnne Starr
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach CostResilient Systems
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptxC4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptxbakhtinasiriav
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelCyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelPaul Di Gangi
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 

Similar a Enabling Science with Trust and Security – Guest Keynote (20)

Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor Risk
 
PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioieh
 
Security Analytics Beyond Cyber
Security Analytics Beyond CyberSecurity Analytics Beyond Cyber
Security Analytics Beyond Cyber
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptxC4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelCyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework Panel
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 

Más de Globus

Advanced Globus System Administration Topics
Advanced Globus System Administration TopicsAdvanced Globus System Administration Topics
Advanced Globus System Administration TopicsGlobus
 
Instrument Data Automation: The Life of a Flow
Instrument Data Automation: The Life of a FlowInstrument Data Automation: The Life of a Flow
Instrument Data Automation: The Life of a FlowGlobus
 
Building Research Applications with Globus PaaS
Building Research Applications with Globus PaaSBuilding Research Applications with Globus PaaS
Building Research Applications with Globus PaaSGlobus
 
Reliable, Remote Computation at All Scales
Reliable, Remote Computation at All ScalesReliable, Remote Computation at All Scales
Reliable, Remote Computation at All ScalesGlobus
 
Best Practices for Data Sharing Using Globus
Best Practices for Data Sharing Using GlobusBest Practices for Data Sharing Using Globus
Best Practices for Data Sharing Using GlobusGlobus
 
An Introduction to Globus for Researchers
An Introduction to Globus for ResearchersAn Introduction to Globus for Researchers
An Introduction to Globus for ResearchersGlobus
 
Introduction to Research Automation with Globus
Introduction to Research Automation with GlobusIntroduction to Research Automation with Globus
Introduction to Research Automation with GlobusGlobus
 
Globus for System Administrators
Globus for System AdministratorsGlobus for System Administrators
Globus for System AdministratorsGlobus
 
Introduction to Globus for System Administrators
Introduction to Globus for System AdministratorsIntroduction to Globus for System Administrators
Introduction to Globus for System AdministratorsGlobus
 
Introduction to Data Transfer and Sharing for Researchers
Introduction to Data Transfer and Sharing for ResearchersIntroduction to Data Transfer and Sharing for Researchers
Introduction to Data Transfer and Sharing for ResearchersGlobus
 
Introduction to the Globus Platform for Developers
Introduction to the Globus Platform for DevelopersIntroduction to the Globus Platform for Developers
Introduction to the Globus Platform for DevelopersGlobus
 
Introduction to the Command Line Interface (CLI)
Introduction to the Command Line Interface (CLI)Introduction to the Command Line Interface (CLI)
Introduction to the Command Line Interface (CLI)Globus
 
Automating Research Data with Globus Flows and Compute
Automating Research Data with Globus Flows and ComputeAutomating Research Data with Globus Flows and Compute
Automating Research Data with Globus Flows and ComputeGlobus
 
Automating Research Data Flows and Introduction to the Globus Platform
Automating Research Data Flows and Introduction to the Globus PlatformAutomating Research Data Flows and Introduction to the Globus Platform
Automating Research Data Flows and Introduction to the Globus PlatformGlobus
 
Advanced Globus System Administration
Advanced Globus System AdministrationAdvanced Globus System Administration
Advanced Globus System AdministrationGlobus
 
Introduction to Globus for System Administrators
Introduction to Globus for System AdministratorsIntroduction to Globus for System Administrators
Introduction to Globus for System AdministratorsGlobus
 
Introduction to Globus for New Users
Introduction to Globus for New UsersIntroduction to Globus for New Users
Introduction to Globus for New UsersGlobus
 
Working with Globus Platform Services and Portals
Working with Globus Platform Services and PortalsWorking with Globus Platform Services and Portals
Working with Globus Platform Services and PortalsGlobus
 
Globus Automation
Globus AutomationGlobus Automation
Globus AutomationGlobus
 
Advanced Globus System Administration
Advanced Globus System AdministrationAdvanced Globus System Administration
Advanced Globus System AdministrationGlobus
 

Más de Globus (20)

Advanced Globus System Administration Topics
Advanced Globus System Administration TopicsAdvanced Globus System Administration Topics
Advanced Globus System Administration Topics
 
Instrument Data Automation: The Life of a Flow
Instrument Data Automation: The Life of a FlowInstrument Data Automation: The Life of a Flow
Instrument Data Automation: The Life of a Flow
 
Building Research Applications with Globus PaaS
Building Research Applications with Globus PaaSBuilding Research Applications with Globus PaaS
Building Research Applications with Globus PaaS
 
Reliable, Remote Computation at All Scales
Reliable, Remote Computation at All ScalesReliable, Remote Computation at All Scales
Reliable, Remote Computation at All Scales
 
Best Practices for Data Sharing Using Globus
Best Practices for Data Sharing Using GlobusBest Practices for Data Sharing Using Globus
Best Practices for Data Sharing Using Globus
 
An Introduction to Globus for Researchers
An Introduction to Globus for ResearchersAn Introduction to Globus for Researchers
An Introduction to Globus for Researchers
 
Introduction to Research Automation with Globus
Introduction to Research Automation with GlobusIntroduction to Research Automation with Globus
Introduction to Research Automation with Globus
 
Globus for System Administrators
Globus for System AdministratorsGlobus for System Administrators
Globus for System Administrators
 
Introduction to Globus for System Administrators
Introduction to Globus for System AdministratorsIntroduction to Globus for System Administrators
Introduction to Globus for System Administrators
 
Introduction to Data Transfer and Sharing for Researchers
Introduction to Data Transfer and Sharing for ResearchersIntroduction to Data Transfer and Sharing for Researchers
Introduction to Data Transfer and Sharing for Researchers
 
Introduction to the Globus Platform for Developers
Introduction to the Globus Platform for DevelopersIntroduction to the Globus Platform for Developers
Introduction to the Globus Platform for Developers
 
Introduction to the Command Line Interface (CLI)
Introduction to the Command Line Interface (CLI)Introduction to the Command Line Interface (CLI)
Introduction to the Command Line Interface (CLI)
 
Automating Research Data with Globus Flows and Compute
Automating Research Data with Globus Flows and ComputeAutomating Research Data with Globus Flows and Compute
Automating Research Data with Globus Flows and Compute
 
Automating Research Data Flows and Introduction to the Globus Platform
Automating Research Data Flows and Introduction to the Globus PlatformAutomating Research Data Flows and Introduction to the Globus Platform
Automating Research Data Flows and Introduction to the Globus Platform
 
Advanced Globus System Administration
Advanced Globus System AdministrationAdvanced Globus System Administration
Advanced Globus System Administration
 
Introduction to Globus for System Administrators
Introduction to Globus for System AdministratorsIntroduction to Globus for System Administrators
Introduction to Globus for System Administrators
 
Introduction to Globus for New Users
Introduction to Globus for New UsersIntroduction to Globus for New Users
Introduction to Globus for New Users
 
Working with Globus Platform Services and Portals
Working with Globus Platform Services and PortalsWorking with Globus Platform Services and Portals
Working with Globus Platform Services and Portals
 
Globus Automation
Globus AutomationGlobus Automation
Globus Automation
 
Advanced Globus System Administration
Advanced Globus System AdministrationAdvanced Globus System Administration
Advanced Globus System Administration
 

Último

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Último (20)

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Enabling Science with Trust and Security – Guest Keynote

  • 1. Enabling Science with Trust and Security Tom Barton Sr Consultant for Cybersecurity & Data Privacy UChicago & Internet2 GlobusWorld 2019
  • 2. What I’ll tell you • Security is all about enabling the mission by reducing risk to it • There are security programs designed to reduce risk to research • Trust frameworks reduce risk across complex cyberinfrastructure (CI) ecosystems • Trust frameworks & security enable scientific CI by reducing risk to it • Some practical ways to engage with these 2
  • 3. The simplest case Human subjects research is perhaps the simplest example of security enabling science. Not that it’s easy! 3
  • 4. 4 Rigorous scientific methods help civic partners achieve the greatest social good per dollar
  • 5. Liability incurred by contracts and regulation • Sensitive data provided under contract by external agencies • Variety of security obligations in Data Use Agreements • HIPAA Business Associate Agreements • Government contracts with DFARS flow down requirements • Federal security standards, focused on data confidentiality • Also subject to state regulations protecting personal information • Worst case: existential threat to associated research programs 5
  • 6. Institutional strategy for secure research data • Research Computing, Research Administration, Legal, IT partnership to reduce risk to affected research • Provide security as a service to PIs so they don’t have to figure it out • Elements • Risk assessment in grants & contracts processes • Secure research computing service • Dean and VP Research level policy governance • Broad-based operational governance • Federal security standards: NIST SP 800-53/800-171/CUI • UChicago and many others have one or are moving in that direction 6
  • 8. Benefits and dividends • On-going close coordination between research computing and central IT • Identity & access management • Security operations, incident response and risk assessment • Network engineering • Storage/recovery • Systems administration • Central IT learned how to support other sensitive computing needs • Re-usable building blocks of secure computing technologies and procedures • Total institutional cost is reduced with each re-use 8
  • 9. Can CISOs and Research Computing Directors get along? • Yes! • "Enabling Trustworthy Campus Cyberinfrastructure for Science“ • Workshop by TrustedCI and InCommon, funded by NSF, September 2018 • Chief Information Security Officer and Research Computing Director teams from ~15 universities • Secure research computing needs drive successful partnerships among CISOs, RC Directors, Legal Counsel, Research Administration • Regardless of where RC Director and CISO report, large or small institution, centralized or decentralized 9
  • 10. Review of the simplest case The scientific CI is in one organization, which makes feasible: • Close, on-going operational collaboration between research computing, central IT, information security • Implementation of Federal/NIST security standards Enables human subjects research programs by providing the help needed to address onerous security obligations 10
  • 11. Security and risk Must it always be about complying with Federal/NIST security standards? 11
  • 12. Security Defined by Merriam Webster 1: freedom from danger (safety), freedom from fear or anxiety 4: measures taken to guard against espionage or sabotage, crime, attack, or escape https://www.merriam-webster.com/dictionary/security We should emphasize definition #1, but security practice is traditionally focused on #4 12 slide credit: Von Welch
  • 13. Data lost System unavailable Data altered Private data exposed Enforced shutdown Ransomware Cyber espionage Weaponization Hactivism Identity theft Mal intent Protective and responsive measures Prevent negative impact Extended disruption Cybersecurity – traditional view 13 CI system in designed state
  • 14. Protective and responsive measures Data lost System unavailable Data altered Private data exposed Enforced shutdown Ransomware Cyber espionage Weaponization Misconfiguration Flaw in 3rd party component system Overlooked ancillary functions remain active System restored to unplanned state Uncaught data transport error Inadequate incident response capability Lack of operational coordination leaves system in unplanned stateHactivism Identity theft Mal intent Deltas to CI system design state Negative impact Extended disruption Cyber Risk – it’s not just about bad actors 14
  • 15. Federal security standards address some IT risks 15 IT risk Federal security controls? Misconfiguration Yes Flaw in 3rd party component system Yes Overlooked ancillary functions remain active Yes System restored to unplanned state Yes Lack of operational coordination leaves system in unplanned state No Uncaught data transport error No Inadequate incident response capability Yes
  • 16. Will Federal security frameworks assimilate all US scientific CI? Yes Appropriate, probably unavoidable, for some secure research Some aspects well suited to both open science and secure research No Needs common executive management, hence hard to apply across organizations Some critical IT risks aren’t addressed TrustedCI is developing alternatives for open science • Open Science Cyber Risk Profile • Guide to Developing Cybersecurity Programs for NSF Science and Engineering Projects 16
  • 17. Lack of operational coordination leaves system in unplanned state Please hold this thought in mind for a few minutes…. 17
  • 18. A complex case Trust Frameworks and Federation reduce risk in complex, multi- organizational circumstances 18
  • 19. 19 Since 2015, thirteen ESFRI Research Infrastructures from the field of BioMedical Science (BMS RI) joined their scientific capabilities and services to transform the understanding of biological mechanisms and accelerate its translation into medical care. • biobanking & biomolecular resources •curated databases •marine model organisms •systems biology •translational research •functional genomics •screening & medicinal chemistry •microorganisms •clinical trials •structural biology •biological/medical imaging•plant phenotyping •highly pathogenic microorganisms Slide credit: Mikael Linden
  • 20. Increasing complexity of scientific CI • Bigger data & bigger teams need bigger CI • Beyond the scale a single organization can achieve on its own • Not-bigger funding motivates the concentration of CI investments • Federating or centralizing HPC centers, cloud • Size brings complexity • Federated user access, federated resources • Access management • Data, cache, and network management 20 As scientific CIs integrate more components and organizations, it’s harder to manage, debug, and ascertain the state of the entire system
  • 21. Federated user access – a global infrastucture faculty, students, staff data sets intellectual property specialized instruments specialized computing 68 countries (March 2019) > 16,700 entities (25% InCommon) > 10,000,000 users connected by global research networks and federation 21
  • 22. 22 Get collaboration ready Release “Research & Scholarship” attributes Basic security for Identity Provider Accurate & complete metdata for good user experience Standard MFA request/response Identity assurance info Enable basic collaboration Support high value resources Protect collaboration resources Reduce risk Identity Providers implement Academic Service Providers implement Each item in the bottom two tiers is associated with a trust framework, as is the federation itself
  • 23. InCommon progress on metadata (user experience) 23
  • 24. 24 InCommon’s Baseline Expectations program Dimensions ❏ Security ❏ Privacy ❏ Transparency/Accountability ❏ User Experience Participation Agreement requires everyone to adhere to Baseline Expectations Processes ❏ Community Consensus ❏ Community Dispute Resolution Mostly, it consists of tons of communication and help
  • 25. Baseline Roadmap (under development) 25 1Q18 2Q18 3Q18 4Q18 1Q19 2Q19 3Q19 4Q19 1Q20 2Q20 3Q20 4Q20 1Q21 2Q21 3Q21 4Q21 Create BE processes, redo contracts, metadata quality. errorURL. SIRTFI all entities. R&S and REFEDS MFA for academic OS IdPs. IdPs must use collaboration- ready software/services.
  • 26. Research & Scholarship attribute release • Name, email, affiliation, persistent identifier • Common need for “research and scholarship” services • Those service providers are “tagged” by their national federation operators as “R&S” • Identity Providers automatically release the R&S attributes to R&S tagged services • Such Identity Providers are also tagged as “R&S” so that services can elect to require R&S attributes in order to provide service • The R&S program contributes to good privacy practice under the European General Data Protection Regulation (GDPR) [ 26 ]
  • 27. SIRTFI - security incident response trust framework for federated identity 27 Be willing to collaborate in responding to a federated security incident. Apply basic operational security protections to your federated entities in line with your organization’s priorities. Self-assert SIRTFI “tag” so that others will know to trust this about you.
  • 28. REFEDS Assurance Framework 28 Identity Assurance Authentication Strength Authentication Single-factor authentication (SFA) Multi-factor authentication (MFA) Attributes Affiliation freshness 1 day Affiliation freshness 1 month ID Proofing Medium (eg postal credential delivery) Low (self-asserted) High (eg F2F) Identifiers ID is unique, personal and traceable ePPN is unique, personal and traceable Defines a standard means for service providers to receive information about identity assurance practice and request and receive information about strength of credentials
  • 29. Review of the complex case & trust frameworks A trust framework is • A standard of behavior that applies to participants and/or components in large, complex, even global systems • Developed in response to identified needs of research and scholarly activities We trust that trust framework adopters reasonably observe the standard of behavior because of our shared mission in Research & Education Federations and other organizations enable and monitor trust framework participation and may operate processes to verify or compel adoption 29
  • 30. Lack of operational coordination leaves system in unplanned state Systems that integrate components across many organizations can use trust frameworks to reduce the risk posed by intrinsic inability to coordinate operationally 30
  • 31. Reducing risk to scientific CI Some services and programs you can take advantage of. Some things you might think about doing. 31
  • 32. ResearchSOC ResearchSOC helps make scientific computing resilient to cyberattacks and capable of supporting trustworthy, productive research. • NSF funded center • Indiana University, Duke University, Pittsburgh Supercomputing Center, University of California San Diego • Security Operations Center • Vulnerability scanning and threat intelligence sharing • Training information security professionals to address challenges of securing research 32
  • 33. TrustedCI and Internet2 • Direct engagements or partnerships to review or solve problems • Security programs for NSF funded activities • Facility/Site Identity & Access Management • Federated user access • Cloud use • Campus Champions / CaRRC • Science Gateways Community Institute • Hope to translate experience with user federation into resource federation space 33
  • 34. Globus Connect/High Assurance • Enhanced Connect Server/Personal to meet the security needs of protected environments for secure research • Only authorized identities • Audit trails • Session timeouts • More… • Enhanced Transfer & Auth services backend in AWS • Meets Federal/NIST security standards • Suited to HIPAA and other sensitive research data 34
  • 35. You – campus research computing staff • Add federated user access tooling to your environment • CILogon, Globus Auth, COmanage, Grouper, others • Help your CISO become your partner • Support Federal security standards for high risk projects, sensible security for low (eg, Open Science Cyber Risk Profile) • Stay abreast of prototype resource federation efforts • Help TrustedCI/Internet2 understand your researchers’ problems and give guidance on good solutions 35
  • 36. You – platform & gateway developers • Use federated user access tooling • Deep water, don’t roll your own user management!! • Help your information security people to help you • Bake sensible security into your dev and operational processes • Provide sensible security functionality to deployers • Your platforms are sometime implemented in very exposed Science DMZs – focus on securing system integrity, make it hard for bad guys to re-purposed as weapons 36
  • 37. You - PIs • Involve research computing staff as early as possible in grant formulation process to optimize proposed data processing workflow • If sensitive research data is involved, early engagement will minimize hurdles & hoops, ensure satisfactory proposed data security plan • Demand sensible security – make the IT and security powers that be know that it matters and you need them for it 37