SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
What will the Sirtfi trust framework
change for FIM4R?
Hannah Short,
hannah.short@cern.ch
Background
•  A Security Incident Response Trust Framework
for Federated Identity
•  Need for common trust framework
•  Enable coordination of security incident response
•  Vector of attack grows more inviting as magnitude of
federated networks increases
•  Self assertion
•  Practical compromise
•  Possible extension to peer assessment
07/12/15 2
What will Sirtfi change?
Impact on FIM4R Communities
•  Trust
•  Support
•  Responsibility
•  Self Audit We need partners
within FIM4R to pilot
this framework!
IdP
Federated incidents
07/12/15 4
Compromised
SP
SP
SP
SP
SP
•  Compromised account
from Identity Provider
(IdP) accesses external
Service Providers (SPs)
•  Could be intra-
federation, or inter-
federation
•  Malicious actor is able to
penetrate the network
and take advantage of
the lack of coordinated
incident response
IdP
IdP
IdP
IdP
SP
It all seems like common sense…
07/12/15 5
SP notices suspicious
jobs executed by a
handful of users from
an IdP
IdP identifies over
1000 compromised
accounts
Notifies IdP
IdP identifies all SPs
accessed
SP
SP
SP
Notifies SPs
IdP
SP
But without Sirtfi…
07/12/15 6
SP notices suspicious
jobs executed by a
handful of users from
an IdP
IdP identifies over
1000 compromised
accounts
Notifies IdP
IdP identifies all SPs
accessed
SP
SP
SP
Notifies SPs
Large SP does not share
details of compromise, for
fear of damage to reputation
Small IdP may not have
capability to block users, or
trace their usage
SPs are not bound to abide by
confidentiality protocol and
disclose sensitive information
!
!
!
!
No security
contact
details!
X
X
X
X
Trust
There will be a higher level of trust for Sirtfi-compliant
organisations. These participants will be more likely to
grant and be granted access to shared resources.
07/12/15 7
SP
SP
SP
eduGAIN
Token
May be granted
to some basic
SPs
Access
restricted to
critical SPs
SP
SP
SP
eduGAIN
Token
User from Sirtfi’d
IdP
eduGAIN
Token
User from non
Sirtfi’d IdP
Before Sirtfi After Sirtfi
Support
Sirtfi-compliant organisations will be able to draw on
support from each other in the event of an incident.
Bridging federations and identifying required expertise will
be facilitated.
07/12/15 8
Sirtfi-compliant IdP
<ContactPerson	
  contactType=“security”>	
  
	
  	
  	
  	
  	
  <EmailAddress>security@myidp.org</EmailAddress>	
  
</ContactPerson>	
  
	
  
<SirtfiCompliance	
  status=“asserted”	
  />	
  
IdP
Who can we trust
with sensitive
information?
Who should
we notify?
Can we count on
a response for
urgent incidents?
Can we get accurate logs
to track the incident
within our community?
Before Sirtfi After Sirtfi
Responsibility
Sirtfi-compliant organisations must be able to comply with
support obligations in the event of a security incident.
Individuals should be identified at each participating
organisation and be aware of expectations.
07/12/15 9
To:	
  security@myidp.org	
  	
  
From:	
  panic_stations@mysp.org	
  
	
  
Urgent!	
  User	
  found	
  submitting	
  
malicious	
  jobs	
  –	
  please	
  investigate!	
  
To:	
  security@myidp.org	
  	
  
From:	
  panic_stations@mysp.org	
  
	
  
**TLP	
  AMBER	
  –	
  Limited	
  distribution	
  
allowed	
  **	
  
	
  
Urgent!	
  User	
  found	
  submitting	
  malicious	
  
jobs	
  –	
  please	
  investigate!	
  Details	
  below…	
  
To:	
  panic_stations@mysp.org	
  
Cc:	
  security@myidp.org	
  	
  
From:	
  hero@myidp.org	
  	
  
	
  
**TLP	
  AMBER	
  –	
  Limited	
  distribution	
  
allowed	
  **	
  
	
  
Absolutely–	
  I’m	
  on	
  rota	
  this	
  week,	
  
account	
  blocked	
  and	
  we	
  are	
  investigating.	
  
Attaching	
  relevant	
  logs	
  and	
  will	
  keep	
  you	
  
updated.	
  	
  
Before Sirtfi After Sirtfi
Self Audit
Sirtfi-compliant organisations will be required to complete
periodic self assessments to analyse their incident
response capability. Security contact information must be
accurately represented in metadata and be verified during
staffing and business reorganisation.
07/12/15 10
Has anyone
thought about
security?
Before Sirtfi After Sirtfi
What’s next?
•  Potentially RFC
•  LoA requirements
•  Finalisation of metadata elements
•  Security contact element
http://www.slideshare.net/jbasney/saml-security-
contacts
•  Sirtfi compliance element
•  Tool for assessing/managing Sirtfi compliance
attribute
•  Sirtfi v 2.0
•  Requirement to notify Sirtfi partners
•  Alerting mechanism
07/12/15 11
Sirtfi status
•  Consultation closes on December 8th
•  https://wiki.refeds.org/display/CON/SIRTFI
+Consultation%3A+Framework
•  Comments welcome!
07/12/15 Document reference 12
Appendix: Sirtfi assertions
07/12/15 13
Operational security
•  [OS1] Security patches in operating system and
application software are applied in a timely manner.
•  [OS2] A process is used to manage vulnerabilities in
software operated by the organisation.
•  [OS3] Mechanisms are deployed to detect possible
intrusions and protect information systems from significant
and immediate threats
•  [OS4] A user’s access rights can be suspended, modified
or terminated in a timely manner.
•  [OS5] Users and Service Owners (as defined by ITIL
[ITIL]) within the organisation can be contacted.
•  [OS6] A security incident response capability exists within
the organisation with sufficient authority to mitigate,
contain the spread of, and remediate the effects of a
security incident.
07/12/15 14
Incident response
•  [IR1] Provide security incident response contact
information as may be requested by an R&E federation to
which your organization belongs.
•  [IR2] Respond to requests for assistance with a security
incident from other organisations participating in the Sirtfi
trust framework in a timely manner.
•  [IR3] Be able and willing to collaborate in the management
of a security incident with affected organisations that
participate in the Sirtfi trust framework.
•  [IR4] Follow security incident response procedures
established for the organisation.
•  [IR5] Respect user privacy as determined by the
organisations policies or legal counsel.
•  [IR6] Respect and use the Traffic Light Protocol [TLP]
information disclosure policy.
07/12/15 15
Traceability
•  [TR1] Relevant system generated information, including accurate
timestamps and identifiers of system components and actors, are
retained and available for use in security incident response
procedures.
•  [TR2] Information attested to in [TR1] is retained in conformance
with the organisation’s security incident response policy or
practices.
07/12/15 16
Participant responsibilities
•  [PR1] The participant has an Acceptable Use Policy
(AUP).
•  [PR2] There is a process to ensure that all users are
aware of and accept the requirement to abide by the AUP,
for example during a registration or renewal process.
07/12/15 17
Questions?
07/12/15 18
hannah.short@cern.ch

Contenu connexe

Tendances

How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threatsAkankshaPathak27
 
Making Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software DevelopmentMaking Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software DevelopmentConSanFrancisco123
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Next Dimension Inc.
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDawn Yankeelov
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber SecurityFireEye, Inc.
 
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...Amazon Web Services
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...PECB
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016patmisasi
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesAlex Rudie
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate PerspectiveDawn Yankeelov
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsUlf Mattsson
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry
 
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Puneet Kukreja
 
Adam Bulava GCC 2019
Adam Bulava GCC 2019Adam Bulava GCC 2019
Adam Bulava GCC 2019ImekDesign
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident responseBrian Honan
 
10 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 202110 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 2021insightscare
 

Tendances (20)

How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threats
 
Making Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software DevelopmentMaking Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software Development
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber Resilience
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
Simple Safe Steps to Cyber Security
Simple Safe Steps to Cyber SecuritySimple Safe Steps to Cyber Security
Simple Safe Steps to Cyber Security
 
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)
 
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
 
Adam Bulava GCC 2019
Adam Bulava GCC 2019Adam Bulava GCC 2019
Adam Bulava GCC 2019
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident response
 
Aujas Cyber Security
Aujas Cyber SecurityAujas Cyber Security
Aujas Cyber Security
 
10 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 202110 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 2021
 

En vedette

Industrial microbiology
Industrial microbiologyIndustrial microbiology
Industrial microbiologyameducare
 
Kutuphanelerde Sosyal Medya Yonetimi
Kutuphanelerde Sosyal Medya YonetimiKutuphanelerde Sosyal Medya Yonetimi
Kutuphanelerde Sosyal Medya YonetimiErtugrul Cimen
 
La caminante espectra lpower point
La caminante espectra lpower pointLa caminante espectra lpower point
La caminante espectra lpower pointAnildaAyala
 
Agustin gurvich agua
Agustin gurvich aguaAgustin gurvich agua
Agustin gurvich aguaejemplo12
 
Trábajo práctico 7mo “a”
Trábajo práctico 7mo “a”Trábajo práctico 7mo “a”
Trábajo práctico 7mo “a”ejemplo12
 
Risk Appetite: new challenges to manage an insurance company
Risk Appetite: new challenges to manage an insurance companyRisk Appetite: new challenges to manage an insurance company
Risk Appetite: new challenges to manage an insurance companyPhilippe Foulquier
 
A Quasi Relational Query Language for Persistent Standardized EHRs: Using NoS...
A Quasi Relational Query Language for Persistent Standardized EHRs: Using NoS...A Quasi Relational Query Language for Persistent Standardized EHRs: Using NoS...
A Quasi Relational Query Language for Persistent Standardized EHRs: Using NoS...Aastha Madaan
 
Advancement Metrics and Reporting On the prowl for greater success.
Advancement Metrics and Reporting On the prowl for greater success.Advancement Metrics and Reporting On the prowl for greater success.
Advancement Metrics and Reporting On the prowl for greater success.Paul Prewitt
 
3 Master Thesis-WenQian-R0601448
3 Master Thesis-WenQian-R06014483 Master Thesis-WenQian-R0601448
3 Master Thesis-WenQian-R0601448Wen Qian
 

En vedette (13)

Industrial microbiology
Industrial microbiologyIndustrial microbiology
Industrial microbiology
 
Algoritmos UFT
Algoritmos UFTAlgoritmos UFT
Algoritmos UFT
 
Tecnicas de la comunicacion ! ecci
Tecnicas de la comunicacion ! ecciTecnicas de la comunicacion ! ecci
Tecnicas de la comunicacion ! ecci
 
Kutuphanelerde Sosyal Medya Yonetimi
Kutuphanelerde Sosyal Medya YonetimiKutuphanelerde Sosyal Medya Yonetimi
Kutuphanelerde Sosyal Medya Yonetimi
 
La caminante espectra lpower point
La caminante espectra lpower pointLa caminante espectra lpower point
La caminante espectra lpower point
 
Agustin gurvich agua
Agustin gurvich aguaAgustin gurvich agua
Agustin gurvich agua
 
Trábajo práctico 7mo “a”
Trábajo práctico 7mo “a”Trábajo práctico 7mo “a”
Trábajo práctico 7mo “a”
 
Deber exame 2
Deber exame 2Deber exame 2
Deber exame 2
 
Presentación proyecto adriana antonia_helga
Presentación proyecto adriana antonia_helgaPresentación proyecto adriana antonia_helga
Presentación proyecto adriana antonia_helga
 
Risk Appetite: new challenges to manage an insurance company
Risk Appetite: new challenges to manage an insurance companyRisk Appetite: new challenges to manage an insurance company
Risk Appetite: new challenges to manage an insurance company
 
A Quasi Relational Query Language for Persistent Standardized EHRs: Using NoS...
A Quasi Relational Query Language for Persistent Standardized EHRs: Using NoS...A Quasi Relational Query Language for Persistent Standardized EHRs: Using NoS...
A Quasi Relational Query Language for Persistent Standardized EHRs: Using NoS...
 
Advancement Metrics and Reporting On the prowl for greater success.
Advancement Metrics and Reporting On the prowl for greater success.Advancement Metrics and Reporting On the prowl for greater success.
Advancement Metrics and Reporting On the prowl for greater success.
 
3 Master Thesis-WenQian-R0601448
3 Master Thesis-WenQian-R06014483 Master Thesis-WenQian-R0601448
3 Master Thesis-WenQian-R0601448
 

Similaire à What will Sirtfi change for FIM4R?

2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyStephanie McVitty
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementProlifics
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 
Intellinx overview.2010
Intellinx overview.2010Intellinx overview.2010
Intellinx overview.2010Jim Porell
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalPriyanka Aash
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligencePrachi Mishra
 
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...NetworkCollaborators
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfTop_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfinfosec train
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfShivamSharma909
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response PlanNext Dimension Inc.
 
How to build a cyber threat intelligence program
How to build a cyber threat intelligence programHow to build a cyber threat intelligence program
How to build a cyber threat intelligence programMark Arena
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Karl Kispert
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021lior mazor
 
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Shawn Tuma
 
How to protect your company from cyber attacks
How to protect your company from cyber attacksHow to protect your company from cyber attacks
How to protect your company from cyber attacksCompany
 
CA_Module_13.pdf
CA_Module_13.pdfCA_Module_13.pdf
CA_Module_13.pdfEhabRushdy1
 

Similaire à What will Sirtfi change for FIM4R? (20)

2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access Management
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Intellinx overview.2010
Intellinx overview.2010Intellinx overview.2010
Intellinx overview.2010
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfTop_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdf
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
How to build a cyber threat intelligence program
How to build a cyber threat intelligence programHow to build a cyber threat intelligence program
How to build a cyber threat intelligence program
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
 
How to protect your company from cyber attacks
How to protect your company from cyber attacksHow to protect your company from cyber attacks
How to protect your company from cyber attacks
 
Maritime Cyber Security
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
 
CA_Module_13.pdf
CA_Module_13.pdfCA_Module_13.pdf
CA_Module_13.pdf
 

Dernier

What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 

Dernier (20)

What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 

What will Sirtfi change for FIM4R?

  • 1. What will the Sirtfi trust framework change for FIM4R? Hannah Short, hannah.short@cern.ch
  • 2. Background •  A Security Incident Response Trust Framework for Federated Identity •  Need for common trust framework •  Enable coordination of security incident response •  Vector of attack grows more inviting as magnitude of federated networks increases •  Self assertion •  Practical compromise •  Possible extension to peer assessment 07/12/15 2
  • 3. What will Sirtfi change? Impact on FIM4R Communities •  Trust •  Support •  Responsibility •  Self Audit We need partners within FIM4R to pilot this framework!
  • 4. IdP Federated incidents 07/12/15 4 Compromised SP SP SP SP SP •  Compromised account from Identity Provider (IdP) accesses external Service Providers (SPs) •  Could be intra- federation, or inter- federation •  Malicious actor is able to penetrate the network and take advantage of the lack of coordinated incident response IdP IdP IdP
  • 5. IdP SP It all seems like common sense… 07/12/15 5 SP notices suspicious jobs executed by a handful of users from an IdP IdP identifies over 1000 compromised accounts Notifies IdP IdP identifies all SPs accessed SP SP SP Notifies SPs
  • 6. IdP SP But without Sirtfi… 07/12/15 6 SP notices suspicious jobs executed by a handful of users from an IdP IdP identifies over 1000 compromised accounts Notifies IdP IdP identifies all SPs accessed SP SP SP Notifies SPs Large SP does not share details of compromise, for fear of damage to reputation Small IdP may not have capability to block users, or trace their usage SPs are not bound to abide by confidentiality protocol and disclose sensitive information ! ! ! ! No security contact details! X X X X
  • 7. Trust There will be a higher level of trust for Sirtfi-compliant organisations. These participants will be more likely to grant and be granted access to shared resources. 07/12/15 7 SP SP SP eduGAIN Token May be granted to some basic SPs Access restricted to critical SPs SP SP SP eduGAIN Token User from Sirtfi’d IdP eduGAIN Token User from non Sirtfi’d IdP Before Sirtfi After Sirtfi
  • 8. Support Sirtfi-compliant organisations will be able to draw on support from each other in the event of an incident. Bridging federations and identifying required expertise will be facilitated. 07/12/15 8 Sirtfi-compliant IdP <ContactPerson  contactType=“security”>            <EmailAddress>security@myidp.org</EmailAddress>   </ContactPerson>     <SirtfiCompliance  status=“asserted”  />   IdP Who can we trust with sensitive information? Who should we notify? Can we count on a response for urgent incidents? Can we get accurate logs to track the incident within our community? Before Sirtfi After Sirtfi
  • 9. Responsibility Sirtfi-compliant organisations must be able to comply with support obligations in the event of a security incident. Individuals should be identified at each participating organisation and be aware of expectations. 07/12/15 9 To:  security@myidp.org     From:  panic_stations@mysp.org     Urgent!  User  found  submitting   malicious  jobs  –  please  investigate!   To:  security@myidp.org     From:  panic_stations@mysp.org     **TLP  AMBER  –  Limited  distribution   allowed  **     Urgent!  User  found  submitting  malicious   jobs  –  please  investigate!  Details  below…   To:  panic_stations@mysp.org   Cc:  security@myidp.org     From:  hero@myidp.org       **TLP  AMBER  –  Limited  distribution   allowed  **     Absolutely–  I’m  on  rota  this  week,   account  blocked  and  we  are  investigating.   Attaching  relevant  logs  and  will  keep  you   updated.     Before Sirtfi After Sirtfi
  • 10. Self Audit Sirtfi-compliant organisations will be required to complete periodic self assessments to analyse their incident response capability. Security contact information must be accurately represented in metadata and be verified during staffing and business reorganisation. 07/12/15 10 Has anyone thought about security? Before Sirtfi After Sirtfi
  • 11. What’s next? •  Potentially RFC •  LoA requirements •  Finalisation of metadata elements •  Security contact element http://www.slideshare.net/jbasney/saml-security- contacts •  Sirtfi compliance element •  Tool for assessing/managing Sirtfi compliance attribute •  Sirtfi v 2.0 •  Requirement to notify Sirtfi partners •  Alerting mechanism 07/12/15 11
  • 12. Sirtfi status •  Consultation closes on December 8th •  https://wiki.refeds.org/display/CON/SIRTFI +Consultation%3A+Framework •  Comments welcome! 07/12/15 Document reference 12
  • 14. Operational security •  [OS1] Security patches in operating system and application software are applied in a timely manner. •  [OS2] A process is used to manage vulnerabilities in software operated by the organisation. •  [OS3] Mechanisms are deployed to detect possible intrusions and protect information systems from significant and immediate threats •  [OS4] A user’s access rights can be suspended, modified or terminated in a timely manner. •  [OS5] Users and Service Owners (as defined by ITIL [ITIL]) within the organisation can be contacted. •  [OS6] A security incident response capability exists within the organisation with sufficient authority to mitigate, contain the spread of, and remediate the effects of a security incident. 07/12/15 14
  • 15. Incident response •  [IR1] Provide security incident response contact information as may be requested by an R&E federation to which your organization belongs. •  [IR2] Respond to requests for assistance with a security incident from other organisations participating in the Sirtfi trust framework in a timely manner. •  [IR3] Be able and willing to collaborate in the management of a security incident with affected organisations that participate in the Sirtfi trust framework. •  [IR4] Follow security incident response procedures established for the organisation. •  [IR5] Respect user privacy as determined by the organisations policies or legal counsel. •  [IR6] Respect and use the Traffic Light Protocol [TLP] information disclosure policy. 07/12/15 15
  • 16. Traceability •  [TR1] Relevant system generated information, including accurate timestamps and identifiers of system components and actors, are retained and available for use in security incident response procedures. •  [TR2] Information attested to in [TR1] is retained in conformance with the organisation’s security incident response policy or practices. 07/12/15 16
  • 17. Participant responsibilities •  [PR1] The participant has an Acceptable Use Policy (AUP). •  [PR2] There is a process to ensure that all users are aware of and accept the requirement to abide by the AUP, for example during a registration or renewal process. 07/12/15 17