1&2 3&4 UCISA-NeSC Managers Forum How do I Grid-enable my University? The challenges posed by e-Science and the Grid paradigm Security and Grids: A contradiction in terms? Security “So, you want me to take the highest performing compute clusters, the biggest fastest datastores, connected together using the best available networks, and make them available to anyone who is connected to any Grid client?” Well, not quite. Andrew Martin Oxford e-Science Centre Grids coordinated resource sharing and problem solving in dynamic, multi-institutional virtual organisations. Contents • Security and Grids: A contradiction in terms? • Grid Security Distinctives • Three Specifics • The Future Grids without Acronyms — direct access to computers, software, data, and other resources — required by a range of collaborative problem-solving and resource brokering strategies emerging in industry, science, and engineering — necessarily highly controlled with resource providers and consumers defining clearly and carefully just what is shared, who is allowed to share, and the conditions under which sharing occurs. [Foster, Kesselman, Tueke] 5&6 7&8 A real challenge The scale of the problem is significant: • a complex socio-technical system Grid Security Distinctives • trust is a slippery subject; multiple trust domains • valuable resources; valuable data • mobile code; mobile data; mobile users. • Virtual Organisations • Separation of Authorization and Authentication • Need for delegation • Conceptually, the network becomes one big computer — compare with decades of operating system research • Distributed trust in a dynamic network • Concerns chase down to classical notions of confidentiality, integrity, availability. Virtual Organisations (VOs) A wider movement • new patterns of work and interaction; dynamic behaviour VOs are one of the most-promoted features of Grid computing: bring together a group of people and resources for a short- or medium-term task, and disband later. • growing scale and scope • single sign-on But most of our approaches to accounting and user management assume that people and machines move around relatively little. • pervasive technologies (mobility, handheld, wireless) • When the VO suffers an incident, whom do we contact? • developing threat landscape • When it goes badly wrong, whom do I sue? Virtual organisations aren’t real. . . 9 & 10 11 & 12 Authorization and Authentication Part of the solution is to manage these two elements separately. Authentication: who are you? can you prove it? Establish a single accepted way to do this, and use it widely. Authorization: permission to do things based on authenticated identity, project membership, present location, time/date . . . Three Specifics • Public Key Infrastructure (PKI) • Firewall interaction • Organisational Politics Authorization is complicated considerably by the desire to permit delegation. Public Key Infrastructure (PKI) Trust • means of achieving a single identity (and single-sign on) across disparate resources Trust-at-a-distance is one of the central problems in distributed computing. • implies need for roots of trust (Certificate Authorities, CAs) • Should I trust the users? [no!] • Should the users trust the sysadmins? • for an individual, the basis of any authorisation decision is an identity certificate • Why should the users entrust their data/software to my system? • requires key management by individuals: a new kind of self-discipline Dynamic VOs make this problem very much worse. • e-Science programme presently has a single CA, with Registration Authorities (RAs) in each institution • this is probably the pattern for the future, too, but ask JISC! 13 & 14 15 & 16 Firewall Interaction The Future • Firewalls challenge diversity and throughput. • We have a conceptual problem with security perimeters. • US TeraGrid partitions Grid facilities from the rest of the Internet. • Present UK designs: trusted host database, dynamic firewall. • Web services (Grid services) necessitate a re-evaluation. Now: Next: • ‘level two’ testbed • production Grids • applications-led • Grid services • very heterogeneous • persistent capabilities • e-Science CA at CCLRC • emergency response • user regulations • Move towards firewall as part of Grid infrastructure. References Organisational Politics Security Task Force, e-Science Core Programme • The biggest present challenges for Grid computing are social ones. • Security challenges are real, but are also subject of paranoia, fear, uncertainty, doubt. • The trust question has both technical and social dimensions/ http://www.nesc.ac.uk/teams/stf Security Roadmap looking at open problems, forthcoming Rough Guide to Grid Security, Mike Surridge http://www.nesc.ac.uk/technical papers • Grids need to build community for various reasons — one is for a shared appreciation of security needs. Grid Engineering Task Force, Security Working Group • Much effort has been expended in harmonisation of policies and procedures; no doubt more is needed. A critical survey of Grid security requirements and technologies, Philippa Broadfoot and Andrew Martin. http://www.grid-support.ac.uk/etf/security http://web.comlab.ox.ac.uk/oucl/publications/tr/rr-03-15.html 17 & 18 Summary • Security and Grids: A contradiction in terms? • Grid Security Distinctives • Three Specifics • The Future