SlideShare une entreprise Scribd logo
1  sur  33
Assurance Requirements for
e-Infrastructure Services
Martin Hamilton
Loughborough University /
HPC Midlands
Cloudy With a Chance of Rootkits
Martin Hamilton
Loughborough University /
HPC Midlands
Topics
1. What is e-Infrastructure?
2. Barriers to Adoption
3. Opening Pandora’s Box

4. Conclusions
Topics
1. What is e-Infrastructure?
2. Barriers to Adoption
3. Opening Pandora’s Box

4. Conclusions
1. What is e-Infrastructure?
—Research community
context:
HPC, SKA, LHC, DLS, NGS
and other TLAs
—Industrial context:
TSB Catapults, BIS/EPSRC
supercomputer
centres, “on ramps” for
SMEs
1. What is e-Infrastructure?
[http://goo.gl/fIpA7R]
1. What is e-Infrastructure?
Case Study - HPC Midlands:
—BIS/EPSRC regional centre
—3,000 core supercomputer
—Expertise from Loughborough
University & University of
Leicester
—Software from leading ISVs
—Flexible usage model for use
by research and industry
1. What is e-Infrastructure?
Case Study - HPC Midlands:
—BIS/EPSRC regional centre
—3,000 core supercomputer
—Expertise from Loughborough
University & University of
Leicester
—Software from leading ISVs
—Flexible usage model for use
by research and industry
1. What is e-Infrastructure?
1. What is e-Infrastructure?
1. What is e-Infrastructure?
Not just HPC:
- Bioinformatics
- Diamond Light
Source, SKA etc
- Major capital kit at
Institutions
- But not just kit?
- Open Access Pubs
- Open Data
- Software
Topics
1. What is e-Infrastructure?
2. Barriers to Adoption
3. Opening Pandora’s Box

4. Conclusions
2. Barriers to Adoption

Picture credits: CC-BY-NC by Flickr user ladybeames; Peter Strutton, HPC Midlands
2. Barriers to Adoption - Awareness
equipment.data.ac.uk
Kit Catalogue™ – kitcatalogue.com

Key question:
What are the boundaries
of e-Infrastructure?
2. Barriers to Adoption - Awareness
2. Barriers to Adoption - Awareness
2. Barriers to Adoption - Awareness
2. Barriers to Adoption - Training
2. Barriers to Adoption - Training
- Typically supply led
- Inflexible timing
- Prohibitively
expensive for SMEs
- Ad-hoc engagement
with ISVs
- Where is the MOOC?
2. Barriers to Adoption - Assurance
Challenging
preconceptions:
—“Supercomputing is just for
rocket scientists”
—“Academic services are
inherently insecure”
—“Legal would never sign off
on anything like this”
—“It’s just too hard to satisfy
assurance requirements”
Photo credit: CC-BY-NC by Flickr user justin_case
2. Barriers to Adoption - Assurance
Challenging preconceptions:
—Common off-the-shelf packages
have HPC solver capability, e.g.
FLUENT, NASTRAN, MATLAB
—Pen testing / audit tools don’t
care if you are an academic site
—Locking systems down is hard
work – get over it
—FTSE100 firms’ have similar
requirements to research and
education organizations
Photo credit: CC-BY-NC by Flickr user justin_case
2. Barriers to Adoption - Assurance
Challenging preconceptions:
—Common off-the-shelf packages
have HPC solver capability, e.g.
FLUENT, NASTRAN, MATLAB
—Pen testing / audit tools don’t
care if you are an academic site
—Locking systems down is hard
work – get over it
—FTSE100 firms’ have similar
requirements to research and
education organizations
Photo credit: CC-BY-NC by Flickr user justin_case
Topics
1. What is e-Infrastructure?
2. Barriers to Adoption
3. Opening Pandora’s Box

4. Conclusions
3. Opening Pandora’s Box
3. Opening Pandora’s Box
—Who makes the agreement?
—Dedicated special purpose vehicle, spin-out
company, cost sharing groups, VAT exemption etc

—What does it look like?
—Guaranteed turnaround time?
—Reducing the friction

—Compliance challenges
—ISO 27002, CESG InfoSec, physical security (e.g.
LPS 1175), CIS audit tool, pen testing / auditing
3. Opening Pandora’s Box
—Who makes the agreement?
—Dedicated special purpose vehicle, spin-out
company, cost sharing groups, VAT exemption etc

—What does it look like?
—Guaranteed turnaround time?
—Reducing the friction

—Compliance challenges
—ISO 27002, CESG InfoSec, physical security (e.g.
LPS 1175), CIS audit tool, pen testing / auditing
3. Opening Pandora’s Box

Sample security audit tool output from http://benchmarks.cisecurity.org/
3. Opening Pandora’s Box
—Relationship with customer networks
—Firewall traversal, double NAT, outbound access to
service, inbound access to license servers, double
encryption? (VPN + ssh)

—What would root do?
—Remove unnecessary permissions, turn off unused
services, is command line access even necessary?

—Connectivity
—Online access vs. sneakernet, remote visualization
requirement, JANET connectivity + AAA support
through Moonshot
Topics
1. What is e-Infrastructure?
2. Barriers to Adoption
3. Opening Pandora’s Box

4. Conclusions
4. Conclusions

Photo credit CC-BY-NC Flickr user brianklug
4. Conclusions

Photo credit CC-BY-NC Flickr user brianklug
4. Conclusions
—More disciplined approach to contractual
relations, technical aspects of service provision
—Requirement for certain public sector data, e.g. NHS
patient records

—Similar considerations around regional shared
services as for generic “cloud” providers
—Opportunity to set common expectations around
levels and types of service
—Migration between service providers and marketplace
for e-Infrastructure services
Cloudy With a Chance of Rootkits
Martin Hamilton
@martin_hamilton
m.t.hamilton@lboro.ac.uk

Contenu connexe

Similaire à Cloudy with a Chance of Rootkits - Assurance Requirements for e-Infrastructure Services

Offensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agendaOffensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agendaShivamSharma909
 
Offensive cyber security engineer
Offensive cyber security engineerOffensive cyber security engineer
Offensive cyber security engineerShivamSharma909
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updatedInfosecTrain
 
e-Discovery_2_Cloud_v5
e-Discovery_2_Cloud_v5e-Discovery_2_Cloud_v5
e-Discovery_2_Cloud_v5Steve Markey
 
Cloud bursting methodology
Cloud bursting methodologyCloud bursting methodology
Cloud bursting methodologyJonathan Spindel
 
To Cloud or Not To Cloud
To Cloud or Not To CloudTo Cloud or Not To Cloud
To Cloud or Not To CloudMichael Yung
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfChinatu Uzuegbu
 
SplunkLive! Customer Presentation – UMCP
SplunkLive! Customer Presentation – UMCPSplunkLive! Customer Presentation – UMCP
SplunkLive! Customer Presentation – UMCPSplunk
 
IT is Innovation in Technology
IT is Innovation in TechnologyIT is Innovation in Technology
IT is Innovation in TechnologyMartin Hamilton
 
2015 04 bio it world
2015 04 bio it world2015 04 bio it world
2015 04 bio it worldChris Dwan
 
Managing Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your OrganizationManaging Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your OrganizationCharles Lim
 
Challenges in Practicing High Frequency Releases in Cloud Environments
Challenges in Practicing High Frequency Releases in Cloud Environments Challenges in Practicing High Frequency Releases in Cloud Environments
Challenges in Practicing High Frequency Releases in Cloud Environments Liming Zhu
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3ShivamSharma909
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course contentShivamSharma909
 
Future-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsFuture-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsSteven SIM Kok Leong
 
Grid Middleware – Principles, Practice and Potential
Grid Middleware – Principles, Practice and PotentialGrid Middleware – Principles, Practice and Potential
Grid Middleware – Principles, Practice and PotentialPaul Brebner
 

Similaire à Cloudy with a Chance of Rootkits - Assurance Requirements for e-Infrastructure Services (20)

Offensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agendaOffensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agenda
 
Offensive cyber security engineer
Offensive cyber security engineerOffensive cyber security engineer
Offensive cyber security engineer
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updated
 
e-Discovery_2_Cloud_v5
e-Discovery_2_Cloud_v5e-Discovery_2_Cloud_v5
e-Discovery_2_Cloud_v5
 
Cloud bursting methodology
Cloud bursting methodologyCloud bursting methodology
Cloud bursting methodology
 
To cloud or not to cloud
To cloud or not to cloudTo cloud or not to cloud
To cloud or not to cloud
 
To Cloud or Not To Cloud
To Cloud or Not To CloudTo Cloud or Not To Cloud
To Cloud or Not To Cloud
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 
SplunkLive! Customer Presentation – UMCP
SplunkLive! Customer Presentation – UMCPSplunkLive! Customer Presentation – UMCP
SplunkLive! Customer Presentation – UMCP
 
IT is Innovation in Technology
IT is Innovation in TechnologyIT is Innovation in Technology
IT is Innovation in Technology
 
2015 04 bio it world
2015 04 bio it world2015 04 bio it world
2015 04 bio it world
 
Managing Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your OrganizationManaging Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your Organization
 
CompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and TricksCompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and Tricks
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
 
Thesis Defense MBI
Thesis Defense MBIThesis Defense MBI
Thesis Defense MBI
 
Challenges in Practicing High Frequency Releases in Cloud Environments
Challenges in Practicing High Frequency Releases in Cloud Environments Challenges in Practicing High Frequency Releases in Cloud Environments
Challenges in Practicing High Frequency Releases in Cloud Environments
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
Future-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsFuture-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical Threats
 
Grid Middleware – Principles, Practice and Potential
Grid Middleware – Principles, Practice and PotentialGrid Middleware – Principles, Practice and Potential
Grid Middleware – Principles, Practice and Potential
 

Plus de Martin Hamilton

Keep taking the tablets? The graduation of the iPad generation
Keep taking the tablets? The graduation of the iPad generationKeep taking the tablets? The graduation of the iPad generation
Keep taking the tablets? The graduation of the iPad generationMartin Hamilton
 
The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018
The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018
The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018Martin Hamilton
 
The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...
The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...
The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...Martin Hamilton
 
Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...
Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...
Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...Martin Hamilton
 
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018From Blockchain to Brexit - edtech trends for 2018 - BETT 2018
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018Martin Hamilton
 
Martin Hamilton - Digital skills: You won't believe what happened next!
Martin Hamilton - Digital skills: You won't believe what happened next!Martin Hamilton - Digital skills: You won't believe what happened next!
Martin Hamilton - Digital skills: You won't believe what happened next!Martin Hamilton
 
Martin Hamilton - Librarians in Outer Space - CILIP invited talk
Martin Hamilton - Librarians in Outer Space - CILIP invited talkMartin Hamilton - Librarians in Outer Space - CILIP invited talk
Martin Hamilton - Librarians in Outer Space - CILIP invited talkMartin Hamilton
 
Martin Hamilton - The impact of technology on the higher education sector - L...
Martin Hamilton - The impact of technology on the higher education sector - L...Martin Hamilton - The impact of technology on the higher education sector - L...
Martin Hamilton - The impact of technology on the higher education sector - L...Martin Hamilton
 
Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...
Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...
Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...Martin Hamilton
 
Martin Hamilton - What did your AI make today? - BCS invited talk
Martin Hamilton - What did your AI make today? - BCS invited talkMartin Hamilton - What did your AI make today? - BCS invited talk
Martin Hamilton - What did your AI make today? - BCS invited talkMartin Hamilton
 
Blockchain in research and education - UKSG Webinar - September 2017
Blockchain in research and education - UKSG Webinar - September 2017Blockchain in research and education - UKSG Webinar - September 2017
Blockchain in research and education - UKSG Webinar - September 2017Martin Hamilton
 
HPC in the cloud comes of age - Red Oak HPC Seminar
HPC in the cloud comes of age - Red Oak HPC SeminarHPC in the cloud comes of age - Red Oak HPC Seminar
HPC in the cloud comes of age - Red Oak HPC SeminarMartin Hamilton
 
Imagining Mars University - Universities UK 2017 conference
Imagining Mars University - Universities UK 2017 conferenceImagining Mars University - Universities UK 2017 conference
Imagining Mars University - Universities UK 2017 conferenceMartin Hamilton
 
Back to the future - Future Proof IT 2017
Back to the future - Future Proof IT 2017Back to the future - Future Proof IT 2017
Back to the future - Future Proof IT 2017Martin Hamilton
 
Tech in exams - SQA Assessment Expert Group - June 2017
Tech in exams - SQA Assessment Expert Group - June 2017Tech in exams - SQA Assessment Expert Group - June 2017
Tech in exams - SQA Assessment Expert Group - June 2017Martin Hamilton
 
Through the Overton Window - Health Education England horizon scanning worksh...
Through the Overton Window - Health Education England horizon scanning worksh...Through the Overton Window - Health Education England horizon scanning worksh...
Through the Overton Window - Health Education England horizon scanning worksh...Martin Hamilton
 
A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...
A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...
A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...Martin Hamilton
 
Help! My robot is a teacher! - Future Edtech 2017
Help! My robot is a teacher! - Future Edtech 2017Help! My robot is a teacher! - Future Edtech 2017
Help! My robot is a teacher! - Future Edtech 2017Martin Hamilton
 
Towards a UK Edtech Strategy - Edtech Vision 2020
Towards a UK Edtech Strategy - Edtech Vision 2020Towards a UK Edtech Strategy - Edtech Vision 2020
Towards a UK Edtech Strategy - Edtech Vision 2020Martin Hamilton
 
Bridging the digital divide - Digital Skills Summit 2017
Bridging the digital divide - Digital Skills Summit 2017Bridging the digital divide - Digital Skills Summit 2017
Bridging the digital divide - Digital Skills Summit 2017Martin Hamilton
 

Plus de Martin Hamilton (20)

Keep taking the tablets? The graduation of the iPad generation
Keep taking the tablets? The graduation of the iPad generationKeep taking the tablets? The graduation of the iPad generation
Keep taking the tablets? The graduation of the iPad generation
 
The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018
The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018
The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018
 
The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...
The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...
The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...
 
Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...
Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...
Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...
 
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018From Blockchain to Brexit - edtech trends for 2018 - BETT 2018
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018
 
Martin Hamilton - Digital skills: You won't believe what happened next!
Martin Hamilton - Digital skills: You won't believe what happened next!Martin Hamilton - Digital skills: You won't believe what happened next!
Martin Hamilton - Digital skills: You won't believe what happened next!
 
Martin Hamilton - Librarians in Outer Space - CILIP invited talk
Martin Hamilton - Librarians in Outer Space - CILIP invited talkMartin Hamilton - Librarians in Outer Space - CILIP invited talk
Martin Hamilton - Librarians in Outer Space - CILIP invited talk
 
Martin Hamilton - The impact of technology on the higher education sector - L...
Martin Hamilton - The impact of technology on the higher education sector - L...Martin Hamilton - The impact of technology on the higher education sector - L...
Martin Hamilton - The impact of technology on the higher education sector - L...
 
Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...
Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...
Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...
 
Martin Hamilton - What did your AI make today? - BCS invited talk
Martin Hamilton - What did your AI make today? - BCS invited talkMartin Hamilton - What did your AI make today? - BCS invited talk
Martin Hamilton - What did your AI make today? - BCS invited talk
 
Blockchain in research and education - UKSG Webinar - September 2017
Blockchain in research and education - UKSG Webinar - September 2017Blockchain in research and education - UKSG Webinar - September 2017
Blockchain in research and education - UKSG Webinar - September 2017
 
HPC in the cloud comes of age - Red Oak HPC Seminar
HPC in the cloud comes of age - Red Oak HPC SeminarHPC in the cloud comes of age - Red Oak HPC Seminar
HPC in the cloud comes of age - Red Oak HPC Seminar
 
Imagining Mars University - Universities UK 2017 conference
Imagining Mars University - Universities UK 2017 conferenceImagining Mars University - Universities UK 2017 conference
Imagining Mars University - Universities UK 2017 conference
 
Back to the future - Future Proof IT 2017
Back to the future - Future Proof IT 2017Back to the future - Future Proof IT 2017
Back to the future - Future Proof IT 2017
 
Tech in exams - SQA Assessment Expert Group - June 2017
Tech in exams - SQA Assessment Expert Group - June 2017Tech in exams - SQA Assessment Expert Group - June 2017
Tech in exams - SQA Assessment Expert Group - June 2017
 
Through the Overton Window - Health Education England horizon scanning worksh...
Through the Overton Window - Health Education England horizon scanning worksh...Through the Overton Window - Health Education England horizon scanning worksh...
Through the Overton Window - Health Education England horizon scanning worksh...
 
A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...
A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...
A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...
 
Help! My robot is a teacher! - Future Edtech 2017
Help! My robot is a teacher! - Future Edtech 2017Help! My robot is a teacher! - Future Edtech 2017
Help! My robot is a teacher! - Future Edtech 2017
 
Towards a UK Edtech Strategy - Edtech Vision 2020
Towards a UK Edtech Strategy - Edtech Vision 2020Towards a UK Edtech Strategy - Edtech Vision 2020
Towards a UK Edtech Strategy - Edtech Vision 2020
 
Bridging the digital divide - Digital Skills Summit 2017
Bridging the digital divide - Digital Skills Summit 2017Bridging the digital divide - Digital Skills Summit 2017
Bridging the digital divide - Digital Skills Summit 2017
 

Dernier

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Dernier (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Cloudy with a Chance of Rootkits - Assurance Requirements for e-Infrastructure Services

  • 1. Assurance Requirements for e-Infrastructure Services Martin Hamilton Loughborough University / HPC Midlands
  • 2. Cloudy With a Chance of Rootkits Martin Hamilton Loughborough University / HPC Midlands
  • 3. Topics 1. What is e-Infrastructure? 2. Barriers to Adoption 3. Opening Pandora’s Box 4. Conclusions
  • 4. Topics 1. What is e-Infrastructure? 2. Barriers to Adoption 3. Opening Pandora’s Box 4. Conclusions
  • 5. 1. What is e-Infrastructure? —Research community context: HPC, SKA, LHC, DLS, NGS and other TLAs —Industrial context: TSB Catapults, BIS/EPSRC supercomputer centres, “on ramps” for SMEs
  • 6. 1. What is e-Infrastructure? [http://goo.gl/fIpA7R]
  • 7. 1. What is e-Infrastructure? Case Study - HPC Midlands: —BIS/EPSRC regional centre —3,000 core supercomputer —Expertise from Loughborough University & University of Leicester —Software from leading ISVs —Flexible usage model for use by research and industry
  • 8. 1. What is e-Infrastructure? Case Study - HPC Midlands: —BIS/EPSRC regional centre —3,000 core supercomputer —Expertise from Loughborough University & University of Leicester —Software from leading ISVs —Flexible usage model for use by research and industry
  • 9. 1. What is e-Infrastructure?
  • 10. 1. What is e-Infrastructure?
  • 11. 1. What is e-Infrastructure? Not just HPC: - Bioinformatics - Diamond Light Source, SKA etc - Major capital kit at Institutions - But not just kit? - Open Access Pubs - Open Data - Software
  • 12. Topics 1. What is e-Infrastructure? 2. Barriers to Adoption 3. Opening Pandora’s Box 4. Conclusions
  • 13. 2. Barriers to Adoption Picture credits: CC-BY-NC by Flickr user ladybeames; Peter Strutton, HPC Midlands
  • 14. 2. Barriers to Adoption - Awareness equipment.data.ac.uk Kit Catalogue™ – kitcatalogue.com Key question: What are the boundaries of e-Infrastructure?
  • 15. 2. Barriers to Adoption - Awareness
  • 16. 2. Barriers to Adoption - Awareness
  • 17. 2. Barriers to Adoption - Awareness
  • 18. 2. Barriers to Adoption - Training
  • 19. 2. Barriers to Adoption - Training - Typically supply led - Inflexible timing - Prohibitively expensive for SMEs - Ad-hoc engagement with ISVs - Where is the MOOC?
  • 20. 2. Barriers to Adoption - Assurance Challenging preconceptions: —“Supercomputing is just for rocket scientists” —“Academic services are inherently insecure” —“Legal would never sign off on anything like this” —“It’s just too hard to satisfy assurance requirements” Photo credit: CC-BY-NC by Flickr user justin_case
  • 21. 2. Barriers to Adoption - Assurance Challenging preconceptions: —Common off-the-shelf packages have HPC solver capability, e.g. FLUENT, NASTRAN, MATLAB —Pen testing / audit tools don’t care if you are an academic site —Locking systems down is hard work – get over it —FTSE100 firms’ have similar requirements to research and education organizations Photo credit: CC-BY-NC by Flickr user justin_case
  • 22. 2. Barriers to Adoption - Assurance Challenging preconceptions: —Common off-the-shelf packages have HPC solver capability, e.g. FLUENT, NASTRAN, MATLAB —Pen testing / audit tools don’t care if you are an academic site —Locking systems down is hard work – get over it —FTSE100 firms’ have similar requirements to research and education organizations Photo credit: CC-BY-NC by Flickr user justin_case
  • 23. Topics 1. What is e-Infrastructure? 2. Barriers to Adoption 3. Opening Pandora’s Box 4. Conclusions
  • 25. 3. Opening Pandora’s Box —Who makes the agreement? —Dedicated special purpose vehicle, spin-out company, cost sharing groups, VAT exemption etc —What does it look like? —Guaranteed turnaround time? —Reducing the friction —Compliance challenges —ISO 27002, CESG InfoSec, physical security (e.g. LPS 1175), CIS audit tool, pen testing / auditing
  • 26. 3. Opening Pandora’s Box —Who makes the agreement? —Dedicated special purpose vehicle, spin-out company, cost sharing groups, VAT exemption etc —What does it look like? —Guaranteed turnaround time? —Reducing the friction —Compliance challenges —ISO 27002, CESG InfoSec, physical security (e.g. LPS 1175), CIS audit tool, pen testing / auditing
  • 27. 3. Opening Pandora’s Box Sample security audit tool output from http://benchmarks.cisecurity.org/
  • 28. 3. Opening Pandora’s Box —Relationship with customer networks —Firewall traversal, double NAT, outbound access to service, inbound access to license servers, double encryption? (VPN + ssh) —What would root do? —Remove unnecessary permissions, turn off unused services, is command line access even necessary? —Connectivity —Online access vs. sneakernet, remote visualization requirement, JANET connectivity + AAA support through Moonshot
  • 29. Topics 1. What is e-Infrastructure? 2. Barriers to Adoption 3. Opening Pandora’s Box 4. Conclusions
  • 30. 4. Conclusions Photo credit CC-BY-NC Flickr user brianklug
  • 31. 4. Conclusions Photo credit CC-BY-NC Flickr user brianklug
  • 32. 4. Conclusions —More disciplined approach to contractual relations, technical aspects of service provision —Requirement for certain public sector data, e.g. NHS patient records —Similar considerations around regional shared services as for generic “cloud” providers —Opportunity to set common expectations around levels and types of service —Migration between service providers and marketplace for e-Infrastructure services
  • 33. Cloudy With a Chance of Rootkits Martin Hamilton @martin_hamilton m.t.hamilton@lboro.ac.uk