Changes between Initial Version and Version 1 of GENIOperationsTrial/GENISecurityCheckStitch


Ignore:
Timestamp:
07/01/15 11:54:19 (9 years ago)
Author:
lnevers@bbn.com
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • GENIOperationsTrial/GENISecurityCheckStitch

    v1 v1  
     1[[PageOutline(1-2)]]
     2
     3= CHK-### GENI Stitching Security Checks =
     4
     5The Internet2 (I2) GENI Stitching Computation Service (SCS) is currently being run as a GENI production service and supported by Internet2 the GENI Meta Operations Center (GMOC).  The SCS service provides GENI Network Stitching path information between GENI sites.
     6
     7= 1.0 GENI Stitching Security Check =
     8
     9== 1.1 Goals of Stitching Security Check ==
     10
     11The SCS server is located at the Internet2 GMOC, where it undergoes standard GMOC security checks. This page captures an outline of security checks activities executed by the GMOC which include:
     12 
     13 - Regularly watch for critical Common Vulnerabilities and Exposures (CVE)s and apply the patches accordingly.
     14 - There are no log reviews on the SCS host (geni-scs.net.internet2.edu) for the SCS service.
     15 - Server emails are sent to a mailing list for archival purposes, but they are not reviewed regularly, but archive is accessible if needed.
     16 - The SCS host geni-scs.net.internt2.edu is monitored for disk, IPMI, load, memory usage, as well as process monitoring such as ntp and the SCS proces.
     17 - Default deny IPTables policy is in place to reject all. Filters allow the SCS, monitoring, and SSH connections only.
     18 - SSH access is limited to a very small subset of IP addresses. Only 3 bastion hosts, 1 backup host, and 1 Rancid collector host are allowed to SSH to the SCS host. All hosts allowed to SSH are in the  Peripheral Component Interconnect (PCI) scope.
     19 - Daily log reviews, and tripwire scans are run on these PCI Peripheral Component Interconnect hosts.
     20 - The GENI SCS host resides in the GlobalNOC address space where there are active vulnerability scans that run monthly, as described in the [https://protect.iu.edu/tools/scanners GMOC Vulnerability Scanners] page.
     21
     22== 1.2 Steps for Stitching Security Check ==
     23
     24No steps are captured in this page, GMOC procedures should be followed.
     25
     26== 1.3 Stitching Security Check - Pass Criteria ==
     27
     28Pass criteria is defined in GMOC procedures.
     29
     30== 1.4 Stitching Security Check - Fail Criteria and Escalation ==
     31
     32Fail criteria is defined in GMOC procedures.
     33
     34'''__Escalation:__'''   GMOC