Use of The Information Services’ EZproxy Service Code of Practice Introduction This code of practice is intended to support the Information Security Policy of the University and should be read in conjunction with this document. http://www.ed.ac.uk/schools-departments/information-services/about/policiesandregulations/security-policies/security-policy This code of practice is also qualified by The University of Edinburgh computing regulations, found at: http://www.ed.ac.uk/schools-departments/information-services/about/policies-and-regulations 1. Revision Date Code of Practice Version 14/09/2012 CoP Version 0.1 QA Date QA Process 17/09/2012 Review by Liz Stevenson L&C Review by David Anderson ITI-Unix Accepted by the IT Security WP 18/09/2012 14 Nov 2012 Template Version 1.4 Author Notes Colin Watt Initial version Notes Suggested date for Revision of the CoP Author 01/09/13 Colin Watt EZproxy Code of Practice v0.1 1 2. System description Revision Date System Version 14/09/2012 Author Notes Colin Watt Initial version 2.1 System name EZproxy service. 2.2 Description of System The EZproxy platform is a web proxy service that provides access to restricted websites that require authentication by IP address, such as electronic resources to which the library subscribes. 2.3 Data 2.4 Components 2.5 System owner 2.6 User base 2.7 Criticality 2.8 Disaster recovery status The service works by dynamically altering the URLs within the web pages provided by the vendor of each protected resource. The server names within the URLs of these web pages are changed to reflect the EZproxy server instead, causing users to return to the EZproxy server as they access links on those web pages. EZproxy does not store or pass on any high risk user data. UUNs are stored in request logs. The EZproxy service is provided by a redundant pair of virtual servers, behind the centrally managed load balacing service. The service is managed by the Digital Library Section within the Library & Collections division of Information Services. The primary contact is Liz Stevenson. The EZproxy service provides valid university users with access to restricted electronic resources via EASE (see EASE Code of Practice). High The EZproxy servers operate as a redundant pair, with separate application server stacks installed on Virtual Machines at two distinct sites. These operate behind the load balancing service as a live-live pair, with traffic redirected if one fails. This process is well documented and thoroughly tested. EZproxy Code of Practice v0.1 2 3. User responsibilities 3.1 Data 3.2 Usernames and passwords 3.3 Physical security 3.4 Remote/mobile working 3.5 Downloads and removal of data from premises Authorisation and access control 3.6 3.7 Competencies There is no end-user access to the EZproxy servers. No user data is stored on or passed to the EZproxy servers. There are administrative accounts for a small number of IS staff ITI Unix staff have access at the operating system and application level. Digital Library staff have access to the application via an admin interface. There is no end-user access to the EZproxy servers. The EZproxy servers are installed on the centrally managed virtual infrastructure within IS managed data centres. Administrative access to the EZproxy servers is limited to a subset of the local University of Edinburgh networks. Remote admin access to the servers must be through these local networks. The only data stored on Ezproxy servers are session cookies, and UUNs in request logs. A small number of IS staff within ITI-Unix have access to the EZproxy server filesystem. A small number of IS Digital Library staff have access to the application config and the resource configuration list. There is no end-user access to the EZproxy servers. ITI-Unix have several years experience and knowledge managing load balanced and virtual server platforms. Library & Collections Digital Library staff have several years knowledge and experience coordination and managing access to electronic resources and in working with ITI to ensure these are made available securely. There is no end-user access to the EZproxy servers. EZproxy Code of Practice v0.1 3 4. System Owner Responsibilities 4.1 Competencies 4.2 Operations L&C’s Digital Library Staff own the EZproxy Service. It is one of this team’s primary functions to specialise in providing access to the library’s online resources and ensure team members have sufficient knowledge and understanding of the concepts, tools, processes, internal operation and security of service to deliver and support a EZproxy service that is highly tailored to the University’s needs. Servers are updated with appropriate operating system upgrades as part of the centrally managed service, to ensure the security of the servers and to protect the resources they access. Application upgrades are carried out by ITI-Unix in consultation with the L&C Digital Library section. Access to the configuration is restricted to administrator logins which are password protected to which only a small number of ITI-Unix staff have access. 4.3 4.4 4.5 System documentation Segregation of Duties Security incidents 4.6 Fault/problem reporting 4.7 Systems development Procedural documentation is held within the ITI-Unix section and L&C Digital Library wikis. System documentation is kept up to date by the application vendor (OCLC) and made available on their web site. - All operating system updates and security patches are carried out by ITI-Unix - All system backups are carried out by ITI-Unix - All application upgrades are carried out by ITI-Unix - All updates to target resources made available are made by L&C’s Digital Library section. On discovery of a security incident the Electronic Resources Team should be contacted via the team Unidesk queue, by logging with the IS Helpline. The Electronic Resources Team will initially investigate and will escalate as appropriate to the Incident Response Team and ITI-Unix. Any security incidents related to the EZproxy servers would be referred to the IS IRT team, who would log the incident and aid with investigation, escalating as appropriate to the ITI-Unix section head. Faults and problem reporting related to end user services (eg electronic journals) should be via the Electronic Resources team Unidesk queue, by logging with the IS Helpline. All systems development is carried out by the application’s vendor, OCLC. EZproxy Code of Practice v0.1 4 5. 5.1 5.2 System Management User account management Access control User accounts are managed by ITI-Unix. ITI-Unix staff have access to the EZproxy administrative logins. A small number of L&C Digital Library Section staff have access to the web based administrative views. 5.3 5.4 A small number of L&C Digital Library Section staff have access to the resource configuration file. Access monitoring EASE logins are logged on a remote, independent system. All other logins are logged locally. Access to the EZproxy service is recorded via logs which are monitored and investigated in the case of reported abuse of the service. Change control Changes are subject to L&C Digital Library change control procedures. Any major change to service would be agreed and scheduled with the DLS Forum (stakeholders for resources impacted by major changes) and communicated through the IS alerts system. 5.5 Systems clock synchronisation 5.6 Network management 5.7 5.8 Standard configuration changes are managed via Unidesk. The systems clock is synchronised to UTC using the NTP protocol. There are no IP or visibility restrictions to the EZproxy service, however there are restrictions to the server backends so that they can only be accessed from the eucsoffices and library vlans. The servers are protected by the central firewall. Business continuity The EZproxy servers operate as a fully redundant live-live pair behind the load balancing service – this function has been rigorously testing during acceptance. Security Control The EZproxy servers each run applications on: - EZproxy port 80 - Secure EZproxy port 80 (different ip address on server) - Admin interface port 2050 - Ssh port 22 The load balancing service handles ssl communications. Secure EZproxy communicates with EZproxy privately on each server. Admin and SSH access is restricted to a small number of IS staff. EZproxy Code of Practice v0.1 5 6. Third Party 6.1 Outsourcing N/A 6.2 N/A 6.3 Contracts and Agreements Compliance with the university security policy N/A 6.4 Personal data N/A EZproxy Code of Practice v0.1 6