E-Science Projects and Security M. Angela Sasse & Mike Surridge Who are we? z M. Angela Sasse, Department of Computer Science, University College London (UCL) – a.sasse@cs.ucl.ac.uk z Mike Surridge IT Innovation, University of Southampton – ms@it-innovation.soton.ac.uk z Members of the Security Task Force Practical Security Workshop Nov. 2003 2 Why are we here? z Previous STF work with projects unveiled raft of issues – Awareness of security issues – Perception – Management – Implementation Practical Security Workshop Nov. 2003 3 Security not high on agenda ‘Still early stages … going from requirements to design’ ‘Get it to work first, then we’ll worry about security.’ – ‘There are no security issues: all our data are public.’ – ‘This is just a proof of concept – no commercial implications.’ Practical Security Workshop Nov. 2003 4 Perceptions & Attitudes No security knowledge and skills Some security knowledge and skills, but … Not interested in security Interested in security, but … “what threat? Doesn’t X do that?” “not my job/ not worth it” “don’t know where to start” “impossible to get it right anyway” Practical Security Workshop Nov. 2003 5 Management issues z Nobody in charge of security – Virtual organisations: no clear lines of communication or responsibility – Ad-hoc decision-making – Urban legends z Implicit assumptions: security is taken care of by others – people (sysadmin, other developers networking, computer centre, …) – technologies (Globus, firewalls, certificates, …) Practical Security Workshop Nov. 2003 6 Difficulties implementing security z Knowledge lacking – Threats – Countermeasures – Best practice z Developers or inaccurate and administrators feel overloaded z Conflicts with institutional regulations and mechanisms Practical Security Workshop Nov. 2003 7 Image problem z Projects vs. security – “security is used to prevent change” – bureaucrats, detached, “preach”, not helpful – projects have many questions, but don’t pursue them in a coherent manner or involve security experts z Security vs. projects – “users don’t care” – something that must be controlled Practical Security Workshop Nov. 2003 8 Policy Purpose z To promote best practice in security – in UK e-Science projects – in the UK e-Science Programme z To recognise and manage security risks from – distributed networked (grid) information systems – distributed, collaborative project management – newly discovered security problems in new grid or e-Science technology z The policy is part of the Programme’s overall security approach Practical Security Workshop Nov. 2003 9 Stipulations z Projects must adopt secure practices – commensurate with the risks they face z Project must – – – – – z document their security policy and practices undertake a detailed threat and risk analysis ensure adequate resources to address threats provide staff training where appropriate keep up to date with security developments Projects may be subject to audit – against their own security policy… Practical Security Workshop Nov. 2003 10 Project Security Policies z Must be commensurate with risks faced – driven by a project threat and risk analysis – not based on any “pre-ordained” security level z May need to address – policy and guidance from the Programme – legal obligations: health and safety, personal data – – – – protection ethical frameworks: oversight committees, etc specific security threats actions to be taken if security is breached community best-practice Practical Security Workshop Nov. 2003 11 Responsibility z Responsibility for the programme policy – UK e-Science Core Programme Directorate – advised by STF and TAG z Responsibility for project security – project Principal Investigator – aided by their project management team z Principal Investigator must – identify and address security roles – establish operational security contact points – ensure project security policy is maintained Practical Security Workshop Nov. 2003 12 Security Risk Management z z Should drive project security policy Requires identification of threats and risks – – – – – – – z to project staff and associated personnel to computer systems to information to relationships to reputation to the UK Programme etc Project security policy must address threats Practical Security Workshop Nov. 2003 13 Practical Security Workshop z Support for project PI’s and their teams – practical risk identification and management – practical advice on specific policy issues – disseminating best practice z Support for the UK Programme through STF – – – – z identifying security risks to the overall programme identifying security risk management methods identifying gaps in technology, processes and skills disseminating best practice The Programme must observe its policy too! Practical Security Workshop Nov. 2003 14 Purpose of Workshop z Help security projects to define their security needs z Share experiences, learn from each other z Introduce methods and tools (risk analysis and management) z First steps towards developing good practice z Identify training and support needs Practical Security Workshop Nov. 2003 15 Workshop Approach z Presentations – on risk identification and management – on project experiences z Breakout sessions – to identify project security risks – to identify appropriate security mechanisms z Results – greater awareness of types of risks and defences – understanding of best practice for projects – gaps and needs of the Programme Practical Security Workshop Nov. 2003 16 Overview Day 1 - morning 10.00 Registration and coffee 10.30 Welcome (Alan Robiette, Chair, Security Task Force for the eScience Programme) 10.45 Workshop Introduction: e-Science projects and security (Mike Surridge, IT Innovation & Angela Sasse, UCL) 11.15 Understanding and managing risks (Jonathan Moffett, York University) 12.15 Lunch Practical Security Workshop Nov. 2003 17 Overview Day 1- afternoon 13.30 myGrid security issues (Luc Moreau, Southampton University) 14.30 Breakout sessions: Identifying risks in your projects (including tea at 15.30) 16.30 Reports from workshop groups 17.15 Security lessons from the EGSO Project (Clare Gryce, UCL) 18.00 Close 19.30 Dinner Practical Security Workshop Nov. 2003 18 Overview Day 2 09.00 Coffee 09.15 Managing security in the DAME Project (Howard Chivers, York University) 10.00 Breakout sessions: Managing risks in your projects (including coffee at 11.00) 12.30 Lunch 13.45 Reports from workshop groups 14.15 Establishing secure practices (Peter Ryan, Newcastle University) 15.00 Closing remarks: Security in e-Science projects First steps in the right direction (Mike Surridge, IT Innovation & Angela Sasse, UCL) Practical Security Workshop Nov. 2003 19