SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
What will the Sirtfi trust framework
change for FIM4R?
Hannah Short,
hannah.short@cern.ch
Background
•  A Security Incident Response Trust Framework
for Federated Identity
•  Need for common trust framework
•  Enable coordination of security incident response
•  Vector of attack grows more inviting as magnitude of
federated networks increases
•  Self assertion
•  Practical compromise
•  Possible extension to peer assessment
07/12/15 2
What will Sirtfi change?
Impact on FIM4R Communities
•  Trust
•  Support
•  Responsibility
•  Self Audit We need partners
within FIM4R to pilot
this framework!
IdP
Federated incidents
07/12/15 4
Compromised
SP
SP
SP
SP
SP
•  Compromised account
from Identity Provider
(IdP) accesses external
Service Providers (SPs)
•  Could be intra-
federation, or inter-
federation
•  Malicious actor is able to
penetrate the network
and take advantage of
the lack of coordinated
incident response
IdP
IdP
IdP
IdP
SP
It all seems like common sense…
07/12/15 5
SP notices suspicious
jobs executed by a
handful of users from
an IdP
IdP identifies over
1000 compromised
accounts
Notifies IdP
IdP identifies all SPs
accessed
SP
SP
SP
Notifies SPs
IdP
SP
But without Sirtfi…
07/12/15 6
SP notices suspicious
jobs executed by a
handful of users from
an IdP
IdP identifies over
1000 compromised
accounts
Notifies IdP
IdP identifies all SPs
accessed
SP
SP
SP
Notifies SPs
Large SP does not share
details of compromise, for
fear of damage to reputation
Small IdP may not have
capability to block users, or
trace their usage
SPs are not bound to abide by
confidentiality protocol and
disclose sensitive information
!
!
!
!
No security
contact
details!
X
X
X
X
Trust
There will be a higher level of trust for Sirtfi-compliant
organisations. These participants will be more likely to
grant and be granted access to shared resources.
07/12/15 7
SP
SP
SP
eduGAIN
Token
May be granted
to some basic
SPs
Access
restricted to
critical SPs
SP
SP
SP
eduGAIN
Token
User from Sirtfi’d
IdP
eduGAIN
Token
User from non
Sirtfi’d IdP
Before Sirtfi After Sirtfi
Support
Sirtfi-compliant organisations will be able to draw on
support from each other in the event of an incident.
Bridging federations and identifying required expertise will
be facilitated.
07/12/15 8
Sirtfi-compliant IdP
<ContactPerson	
  contactType=“security”>	
  
	
  	
  	
  	
  	
  <EmailAddress>security@myidp.org</EmailAddress>	
  
</ContactPerson>	
  
	
  
<SirtfiCompliance	
  status=“asserted”	
  />	
  
IdP
Who can we trust
with sensitive
information?
Who should
we notify?
Can we count on
a response for
urgent incidents?
Can we get accurate logs
to track the incident
within our community?
Before Sirtfi After Sirtfi
Responsibility
Sirtfi-compliant organisations must be able to comply with
support obligations in the event of a security incident.
Individuals should be identified at each participating
organisation and be aware of expectations.
07/12/15 9
To:	
  security@myidp.org	
  	
  
From:	
  panic_stations@mysp.org	
  
	
  
Urgent!	
  User	
  found	
  submitting	
  
malicious	
  jobs	
  –	
  please	
  investigate!	
  
To:	
  security@myidp.org	
  	
  
From:	
  panic_stations@mysp.org	
  
	
  
**TLP	
  AMBER	
  –	
  Limited	
  distribution	
  
allowed	
  **	
  
	
  
Urgent!	
  User	
  found	
  submitting	
  malicious	
  
jobs	
  –	
  please	
  investigate!	
  Details	
  below…	
  
To:	
  panic_stations@mysp.org	
  
Cc:	
  security@myidp.org	
  	
  
From:	
  hero@myidp.org	
  	
  
	
  
**TLP	
  AMBER	
  –	
  Limited	
  distribution	
  
allowed	
  **	
  
	
  
Absolutely–	
  I’m	
  on	
  rota	
  this	
  week,	
  
account	
  blocked	
  and	
  we	
  are	
  investigating.	
  
Attaching	
  relevant	
  logs	
  and	
  will	
  keep	
  you	
  
updated.	
  	
  
Before Sirtfi After Sirtfi
Self Audit
Sirtfi-compliant organisations will be required to complete
periodic self assessments to analyse their incident
response capability. Security contact information must be
accurately represented in metadata and be verified during
staffing and business reorganisation.
07/12/15 10
Has anyone
thought about
security?
Before Sirtfi After Sirtfi
What’s next?
•  Potentially RFC
•  LoA requirements
•  Finalisation of metadata elements
•  Security contact element
http://www.slideshare.net/jbasney/saml-security-
contacts
•  Sirtfi compliance element
•  Tool for assessing/managing Sirtfi compliance
attribute
•  Sirtfi v 2.0
•  Requirement to notify Sirtfi partners
•  Alerting mechanism
07/12/15 11
Sirtfi status
•  Consultation closes on December 8th
•  https://wiki.refeds.org/display/CON/SIRTFI
+Consultation%3A+Framework
•  Comments welcome!
07/12/15 Document reference 12
Appendix: Sirtfi assertions
07/12/15 13
Operational security
•  [OS1] Security patches in operating system and
application software are applied in a timely manner.
•  [OS2] A process is used to manage vulnerabilities in
software operated by the organisation.
•  [OS3] Mechanisms are deployed to detect possible
intrusions and protect information systems from significant
and immediate threats
•  [OS4] A user’s access rights can be suspended, modified
or terminated in a timely manner.
•  [OS5] Users and Service Owners (as defined by ITIL
[ITIL]) within the organisation can be contacted.
•  [OS6] A security incident response capability exists within
the organisation with sufficient authority to mitigate,
contain the spread of, and remediate the effects of a
security incident.
07/12/15 14
Incident response
•  [IR1] Provide security incident response contact
information as may be requested by an R&E federation to
which your organization belongs.
•  [IR2] Respond to requests for assistance with a security
incident from other organisations participating in the Sirtfi
trust framework in a timely manner.
•  [IR3] Be able and willing to collaborate in the management
of a security incident with affected organisations that
participate in the Sirtfi trust framework.
•  [IR4] Follow security incident response procedures
established for the organisation.
•  [IR5] Respect user privacy as determined by the
organisations policies or legal counsel.
•  [IR6] Respect and use the Traffic Light Protocol [TLP]
information disclosure policy.
07/12/15 15
Traceability
•  [TR1] Relevant system generated information, including accurate
timestamps and identifiers of system components and actors, are
retained and available for use in security incident response
procedures.
•  [TR2] Information attested to in [TR1] is retained in conformance
with the organisation’s security incident response policy or
practices.
07/12/15 16
Participant responsibilities
•  [PR1] The participant has an Acceptable Use Policy
(AUP).
•  [PR2] There is a process to ensure that all users are
aware of and accept the requirement to abide by the AUP,
for example during a registration or renewal process.
07/12/15 17
Questions?
07/12/15 18
hannah.short@cern.ch

Contenu connexe

Tendances

How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threatsAkankshaPathak27
 
Making Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software DevelopmentMaking Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software DevelopmentConSanFrancisco123
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Next Dimension Inc.
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDawn Yankeelov
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber SecurityFireEye, Inc.
 
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...Amazon Web Services
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...PECB
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016patmisasi
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesAlex Rudie
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate PerspectiveDawn Yankeelov
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsUlf Mattsson
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry
 
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Puneet Kukreja
 
Adam Bulava GCC 2019
Adam Bulava GCC 2019Adam Bulava GCC 2019
Adam Bulava GCC 2019ImekDesign
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident responseBrian Honan
 
10 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 202110 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 2021insightscare
 

Tendances (20)

How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threats
 
Making Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software DevelopmentMaking Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software Development
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber Resilience
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
Simple Safe Steps to Cyber Security
Simple Safe Steps to Cyber SecuritySimple Safe Steps to Cyber Security
Simple Safe Steps to Cyber Security
 
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)
 
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
 
Adam Bulava GCC 2019
Adam Bulava GCC 2019Adam Bulava GCC 2019
Adam Bulava GCC 2019
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident response
 
Aujas Cyber Security
Aujas Cyber SecurityAujas Cyber Security
Aujas Cyber Security
 
10 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 202110 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 2021
 

En vedette

Industrial microbiology
Industrial microbiologyIndustrial microbiology
Industrial microbiologyameducare
 
Kutuphanelerde Sosyal Medya Yonetimi
Kutuphanelerde Sosyal Medya YonetimiKutuphanelerde Sosyal Medya Yonetimi
Kutuphanelerde Sosyal Medya YonetimiErtugrul Cimen
 
La caminante espectra lpower point
La caminante espectra lpower pointLa caminante espectra lpower point
La caminante espectra lpower pointAnildaAyala
 
Agustin gurvich agua
Agustin gurvich aguaAgustin gurvich agua
Agustin gurvich aguaejemplo12
 
Trábajo práctico 7mo “a”
Trábajo práctico 7mo “a”Trábajo práctico 7mo “a”
Trábajo práctico 7mo “a”ejemplo12
 
Risk Appetite: new challenges to manage an insurance company
Risk Appetite: new challenges to manage an insurance companyRisk Appetite: new challenges to manage an insurance company
Risk Appetite: new challenges to manage an insurance companyPhilippe Foulquier
 
A Quasi Relational Query Language for Persistent Standardized EHRs: Using NoS...
A Quasi Relational Query Language for Persistent Standardized EHRs: Using NoS...A Quasi Relational Query Language for Persistent Standardized EHRs: Using NoS...
A Quasi Relational Query Language for Persistent Standardized EHRs: Using NoS...Aastha Madaan
 
Advancement Metrics and Reporting On the prowl for greater success.
Advancement Metrics and Reporting On the prowl for greater success.Advancement Metrics and Reporting On the prowl for greater success.
Advancement Metrics and Reporting On the prowl for greater success.Paul Prewitt
 
3 Master Thesis-WenQian-R0601448
3 Master Thesis-WenQian-R06014483 Master Thesis-WenQian-R0601448
3 Master Thesis-WenQian-R0601448Wen Qian
 

En vedette (13)

Industrial microbiology
Industrial microbiologyIndustrial microbiology
Industrial microbiology
 
Algoritmos UFT
Algoritmos UFTAlgoritmos UFT
Algoritmos UFT
 
Tecnicas de la comunicacion ! ecci
Tecnicas de la comunicacion ! ecciTecnicas de la comunicacion ! ecci
Tecnicas de la comunicacion ! ecci
 
Kutuphanelerde Sosyal Medya Yonetimi
Kutuphanelerde Sosyal Medya YonetimiKutuphanelerde Sosyal Medya Yonetimi
Kutuphanelerde Sosyal Medya Yonetimi
 
La caminante espectra lpower point
La caminante espectra lpower pointLa caminante espectra lpower point
La caminante espectra lpower point
 
Agustin gurvich agua
Agustin gurvich aguaAgustin gurvich agua
Agustin gurvich agua
 
Trábajo práctico 7mo “a”
Trábajo práctico 7mo “a”Trábajo práctico 7mo “a”
Trábajo práctico 7mo “a”
 
Deber exame 2
Deber exame 2Deber exame 2
Deber exame 2
 
Presentación proyecto adriana antonia_helga
Presentación proyecto adriana antonia_helgaPresentación proyecto adriana antonia_helga
Presentación proyecto adriana antonia_helga
 
Risk Appetite: new challenges to manage an insurance company
Risk Appetite: new challenges to manage an insurance companyRisk Appetite: new challenges to manage an insurance company
Risk Appetite: new challenges to manage an insurance company
 
A Quasi Relational Query Language for Persistent Standardized EHRs: Using NoS...
A Quasi Relational Query Language for Persistent Standardized EHRs: Using NoS...A Quasi Relational Query Language for Persistent Standardized EHRs: Using NoS...
A Quasi Relational Query Language for Persistent Standardized EHRs: Using NoS...
 
Advancement Metrics and Reporting On the prowl for greater success.
Advancement Metrics and Reporting On the prowl for greater success.Advancement Metrics and Reporting On the prowl for greater success.
Advancement Metrics and Reporting On the prowl for greater success.
 
3 Master Thesis-WenQian-R0601448
3 Master Thesis-WenQian-R06014483 Master Thesis-WenQian-R0601448
3 Master Thesis-WenQian-R0601448
 

Similaire à What will Sirtfi change for FIM4R?

2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyStephanie McVitty
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementProlifics
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 
Intellinx overview.2010
Intellinx overview.2010Intellinx overview.2010
Intellinx overview.2010Jim Porell
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalPriyanka Aash
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligencePrachi Mishra
 
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...NetworkCollaborators
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfTop_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfinfosec train
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfShivamSharma909
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response PlanNext Dimension Inc.
 
How to build a cyber threat intelligence program
How to build a cyber threat intelligence programHow to build a cyber threat intelligence program
How to build a cyber threat intelligence programMark Arena
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Karl Kispert
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021lior mazor
 
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Shawn Tuma
 
How to protect your company from cyber attacks
How to protect your company from cyber attacksHow to protect your company from cyber attacks
How to protect your company from cyber attacksCompany
 
CA_Module_13.pdf
CA_Module_13.pdfCA_Module_13.pdf
CA_Module_13.pdfEhabRushdy1
 

Similaire à What will Sirtfi change for FIM4R? (20)

2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access Management
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Intellinx overview.2010
Intellinx overview.2010Intellinx overview.2010
Intellinx overview.2010
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfTop_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdf
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
How to build a cyber threat intelligence program
How to build a cyber threat intelligence programHow to build a cyber threat intelligence program
How to build a cyber threat intelligence program
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
 
How to protect your company from cyber attacks
How to protect your company from cyber attacksHow to protect your company from cyber attacks
How to protect your company from cyber attacks
 
Maritime Cyber Security
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
 
CA_Module_13.pdf
CA_Module_13.pdfCA_Module_13.pdf
CA_Module_13.pdf
 

Dernier

HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 

Dernier (20)

HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 

What will Sirtfi change for FIM4R?

  • 1. What will the Sirtfi trust framework change for FIM4R? Hannah Short, hannah.short@cern.ch
  • 2. Background •  A Security Incident Response Trust Framework for Federated Identity •  Need for common trust framework •  Enable coordination of security incident response •  Vector of attack grows more inviting as magnitude of federated networks increases •  Self assertion •  Practical compromise •  Possible extension to peer assessment 07/12/15 2
  • 3. What will Sirtfi change? Impact on FIM4R Communities •  Trust •  Support •  Responsibility •  Self Audit We need partners within FIM4R to pilot this framework!
  • 4. IdP Federated incidents 07/12/15 4 Compromised SP SP SP SP SP •  Compromised account from Identity Provider (IdP) accesses external Service Providers (SPs) •  Could be intra- federation, or inter- federation •  Malicious actor is able to penetrate the network and take advantage of the lack of coordinated incident response IdP IdP IdP
  • 5. IdP SP It all seems like common sense… 07/12/15 5 SP notices suspicious jobs executed by a handful of users from an IdP IdP identifies over 1000 compromised accounts Notifies IdP IdP identifies all SPs accessed SP SP SP Notifies SPs
  • 6. IdP SP But without Sirtfi… 07/12/15 6 SP notices suspicious jobs executed by a handful of users from an IdP IdP identifies over 1000 compromised accounts Notifies IdP IdP identifies all SPs accessed SP SP SP Notifies SPs Large SP does not share details of compromise, for fear of damage to reputation Small IdP may not have capability to block users, or trace their usage SPs are not bound to abide by confidentiality protocol and disclose sensitive information ! ! ! ! No security contact details! X X X X
  • 7. Trust There will be a higher level of trust for Sirtfi-compliant organisations. These participants will be more likely to grant and be granted access to shared resources. 07/12/15 7 SP SP SP eduGAIN Token May be granted to some basic SPs Access restricted to critical SPs SP SP SP eduGAIN Token User from Sirtfi’d IdP eduGAIN Token User from non Sirtfi’d IdP Before Sirtfi After Sirtfi
  • 8. Support Sirtfi-compliant organisations will be able to draw on support from each other in the event of an incident. Bridging federations and identifying required expertise will be facilitated. 07/12/15 8 Sirtfi-compliant IdP <ContactPerson  contactType=“security”>            <EmailAddress>security@myidp.org</EmailAddress>   </ContactPerson>     <SirtfiCompliance  status=“asserted”  />   IdP Who can we trust with sensitive information? Who should we notify? Can we count on a response for urgent incidents? Can we get accurate logs to track the incident within our community? Before Sirtfi After Sirtfi
  • 9. Responsibility Sirtfi-compliant organisations must be able to comply with support obligations in the event of a security incident. Individuals should be identified at each participating organisation and be aware of expectations. 07/12/15 9 To:  security@myidp.org     From:  panic_stations@mysp.org     Urgent!  User  found  submitting   malicious  jobs  –  please  investigate!   To:  security@myidp.org     From:  panic_stations@mysp.org     **TLP  AMBER  –  Limited  distribution   allowed  **     Urgent!  User  found  submitting  malicious   jobs  –  please  investigate!  Details  below…   To:  panic_stations@mysp.org   Cc:  security@myidp.org     From:  hero@myidp.org       **TLP  AMBER  –  Limited  distribution   allowed  **     Absolutely–  I’m  on  rota  this  week,   account  blocked  and  we  are  investigating.   Attaching  relevant  logs  and  will  keep  you   updated.     Before Sirtfi After Sirtfi
  • 10. Self Audit Sirtfi-compliant organisations will be required to complete periodic self assessments to analyse their incident response capability. Security contact information must be accurately represented in metadata and be verified during staffing and business reorganisation. 07/12/15 10 Has anyone thought about security? Before Sirtfi After Sirtfi
  • 11. What’s next? •  Potentially RFC •  LoA requirements •  Finalisation of metadata elements •  Security contact element http://www.slideshare.net/jbasney/saml-security- contacts •  Sirtfi compliance element •  Tool for assessing/managing Sirtfi compliance attribute •  Sirtfi v 2.0 •  Requirement to notify Sirtfi partners •  Alerting mechanism 07/12/15 11
  • 12. Sirtfi status •  Consultation closes on December 8th •  https://wiki.refeds.org/display/CON/SIRTFI +Consultation%3A+Framework •  Comments welcome! 07/12/15 Document reference 12
  • 14. Operational security •  [OS1] Security patches in operating system and application software are applied in a timely manner. •  [OS2] A process is used to manage vulnerabilities in software operated by the organisation. •  [OS3] Mechanisms are deployed to detect possible intrusions and protect information systems from significant and immediate threats •  [OS4] A user’s access rights can be suspended, modified or terminated in a timely manner. •  [OS5] Users and Service Owners (as defined by ITIL [ITIL]) within the organisation can be contacted. •  [OS6] A security incident response capability exists within the organisation with sufficient authority to mitigate, contain the spread of, and remediate the effects of a security incident. 07/12/15 14
  • 15. Incident response •  [IR1] Provide security incident response contact information as may be requested by an R&E federation to which your organization belongs. •  [IR2] Respond to requests for assistance with a security incident from other organisations participating in the Sirtfi trust framework in a timely manner. •  [IR3] Be able and willing to collaborate in the management of a security incident with affected organisations that participate in the Sirtfi trust framework. •  [IR4] Follow security incident response procedures established for the organisation. •  [IR5] Respect user privacy as determined by the organisations policies or legal counsel. •  [IR6] Respect and use the Traffic Light Protocol [TLP] information disclosure policy. 07/12/15 15
  • 16. Traceability •  [TR1] Relevant system generated information, including accurate timestamps and identifiers of system components and actors, are retained and available for use in security incident response procedures. •  [TR2] Information attested to in [TR1] is retained in conformance with the organisation’s security incident response policy or practices. 07/12/15 16
  • 17. Participant responsibilities •  [PR1] The participant has an Acceptable Use Policy (AUP). •  [PR2] There is a process to ensure that all users are aware of and accept the requirement to abide by the AUP, for example during a registration or renewal process. 07/12/15 17