Document 13316640

advertisement
Uk e-Science Technical Report Series
UKeS-2004-04
ISSN 1751-5971
Security Policy Version 1.4
UK e-Science Programme Security Policy
1. Introduction
This document constitutes the security policy for the UK e-Science Programme. The
Programme is a complex entity with many stakeholders: the Research Councils, industrial
partners and the Department of Trade and Industry who fund much of the research; the
Funding Councils, the Joint Information Systems Committee and UKERNA who together
fund and manage much of the infrastructure; and not least the principal investigators, the
project staff and the institutions in which they work.
Consequently no single party can be said to hold overall responsibility for the policy; in fact
one of the main functions of the policy is to identify who is responsible for which aspects of
security and to establish how the overall policy will be administered. Currently the body
which best represents the collective interests of the various stakeholders is the e-Science
Steering Committee, and the policy has been endorsed by that committee. It is issued on the
authority of the Director of the e-Science Core Programme.
2. Purpose
The purpose of this policy is to promote best practice in Information Security within the
context of the UK e-Science Programme. Specifically, it aims to encourage the adoption of
project-specific processes that lead to desirable outcomes in confidentiality, integrity, and
availability. The intention of this policy is to foster a culture in which there is mutual
support and sharing of information relating to security, for the greater benefit of the
programme as a whole: it is specifically not designed to place excessive or unreasonable
burdens on project staff.
The Programme is committed to establishing and maintaining appropriate standards of
security for the information assets of its projects and collaborations and to enable and support
projects in safeguarding their own assets.
e-Science projects and Grid technologies have special infrastructure requirements and
resources which means that there are increased known security risks and yet to be identified
risks. Additionally the highly distributed nature of e-Science means that the existing
responsibilities, mechanisms and lines of communication do not cover the activities of the
projects in their entirety. It is also recognised that since new Grid technologies may give rise
to additional, unforeseen vulnerabilities, the precise security needs of some projects will be a
matter of discovery over the project lifetime.
Projects must therefore adopt secure processes appropriate to the risks they face, that reflect
best practice to protect both their own assets (people, equipment, data), and the wider
collection of educational and research facilities to which they gain access.
3. Review
The Policy will be reviewed, for relevance and effectiveness, on an annual basis, but may be
supplemented by the issue of new additional policy and practice documents at any time. The
latest version of the Policy and its supporting documentation will always be available via the
National e-Science Centre web site, see http://www.nesc.ac.uk/technical_papers/uk.html.
UKeS-2004-04
Security Policy Version 1.4
4. Scope
The Policy covers any activity impacting on the assets of the e-Science Programme:
infrastructure, code-base, datasets, and its good name. Specifically it applies to all projects,
personnel and facilities funded via an e-Science programme grant, and to all core facilities in
the UK academic and research community recognised as contributing services to the
programme. It also deals with their protection against external threats.
5. Responsibilities
Ultimate responsibility for this Policy rests with the Director General of the Research
Councils, but effective management responsibility is exercised on the Director General's
authority by the UK e-Science Core Programme Directorate.
The Directorate is supported by a Grid Operations Security Team who will review the
security of the e-Science Programme, including this policy and its supporting documentation,
and make recommendations to the Directorate on any policy actions or initiatives that are
needed.
Although in a strict sense the grant holding institution carries the legal responsibility for a
given project, for practical purposes a project's Principal Investigator (PI) will be held
accountable for its security. The PI must identify through the project’s organisational
structure other persons with security-related roles, and should nominate a point of liaison for
operational matters, ensuring that cover for this rôle is provided in case of holiday or sickness
of the regular technical contact.
Security incidents should be reported to the Grid Security Operations Team. In most cases,
contact will be through a host institution's local CERT.
6. Practices
Projects must adopt processes that lead to secure solutions commensurate with the risks they
face. When a project is proposed, its case for support must explain how this will be
achieved. The e-Science programme will provide suitable training in this area. Proposals
should anticipate, where possible, the training and consultancy needs of the project.
Grant-awarding panels may call upon specialist referees to evaluate the security features of a
project proposal. On the advice of those referees or otherwise, they may decide to attach
security-related requirements to a grant offer. These may include
·
Funding for relevant training for project staff, to enable secure processes to be
adopted, and secure features designed from the outset of the project;
·
A requirement to undertake a detailed threat and risk analysis in the early stages of
the project;
·
A requirement to produce a detailed draft project security policy in advance, perhaps
with an external review of that policy;
·
Specific points at which a project security audit will be required, and funding to
facilitate that audit;
·
Specific conditions relating to access to facilities, data sets, etc.;
UKeS-2004-04
Security Policy Version 1.4
·
Requirements to keep up-to-date with ongoing developments in particular security
technologies;
·
Sanctions to be applied if these requirements are not followed.
All funded projects will require a security policy, informed by a risk analysis. A security
policy for a project will usually describe how the following will be taken into account:
·
Policies and guidance from the e-Science programme, including this policy;
·
Legal obligations, such as health and safety, and data protection;
·
Ethical frameworks that constrain the project or the use of any associated capability;
·
Specific concerns or risks arising from the nature of the project, including those of
industrial partners and international collaborators;
·
Established and evolving security practice in Grid-based environments;
·
Actions to be taken upon detection of a breach of policy, whether by project staff or
administrators, or by external persons.
Project security policies should be appropriate to the academic/research community and the
specifics of the research project.
Industrial partners and international collaborators are similarly encouraged to adopt best
practice, and are obliged to follow this policy when accessing assets of the e-Science
programme.
In due course projects may be audited. The project security policy and its associated risk
analysis will be the basis of the audit. The audit will look for evidence that risks have been
adequately addressed in the policy and that processes are in place to support the security
policy.
7. Sanctions
Notwithstanding the intention to be supportive to projects where security is concerned, this
policy provides for sanctions in the event that a project wilfully or through negligence puts
its own and others' security at risk; e.g. in the event that a project fails to follow the security
requirements set out in its offer letter, and/or to adopt appropriate security processes relative
to the risks that it faces. The sanctions will generally match the nature of the failure, and may
range from denial of access to shared e-Science facilities to withholding of grant resource.
The Directorate will recommend the appropriate sanction or sanctions, although sanctions if
confirmed will be applied by the relevant authority (e.g. funding body or facility operator).
The addition of e-Science sanctions does not alter the existing right of the JANET-CERT or
the local institution's IT Services to apply sanctions of their own, if the wider community is
put at risk by the actions of an e-Science project.
UKeS-2004-04
Security Policy Version 1.4
8. Further Information
Further information and guidance will be developed to support this policy and assist projects
and project staff in applying it. All such advice will be made available via the National eScience Centre web site, http://www.nesc.ac.uk/.
Last updated 15 April 2004 by Alan Robiette, <a.robiette@jisc.ac.uk>
Download