report on sig ism
play

Report on SIG-ISM Peter Szegedi, GANT Association Last TF-NOC - PowerPoint PPT Presentation

Report on SIG-ISM Peter Szegedi, GANT Association Last TF-NOC meeting in Cambridge How do we deal with NOC security incidents? Roundtable chaired by Jonny Lundin (NORDUnet) What does TF-CSIRT do (Lionel Ferette - remote)


  1. Report on SIG-ISM Peter Szegedi, GÉANT Association

  2. Last TF-NOC meeting in Cambridge • How do we deal with NOC security incidents? Roundtable chaired by Jonny Lundin (NORDUnet) • What does TF-CSIRT do (Lionel Ferette - remote) • Introduction to the TERENA CISO group (James Davis) • UK National Crime Agency • Discussion about NOC security incidents and NREN security policies in general • NREN Security Strategy Workshop & TERENA CISO SIG kick-off • 3-4 September 2014, Utrecht, Netherlands • ISM-SIG has been created. 2

  3. Information Security Management • Reaching a shared view about international collaboration among NRENs on security, privacy and trust was the main aim of the workshop. • The formation of the new SIG provides a platform for future collaboration in this area. • Parallel group discussions were dedicated to the topics of security, privacy & trust strategy, knowledge sharing, trust frameworks, security services, international collaboration and organising the work of Chief Information Security Officers. • The workshop concluded that harmonisation of strategies is needed, checklists can serve as the simplest security framework for products and services, and 'share with care' is an important maxim. 3

  4. SIG - Information Security Management SIG format with Steering Committee: • Alf Moens (SURF) • Wayne Routly (DANTE) • Rolf Sture Normann (UNINETT) • James Davis (JANET) Closed collaboration with TF-CSIRT, TF-NOC, and TF-MSP 4

  5. Security landscape of GÉANT Ass. • TF-CSIRT • Formal membership (open for commercials), representation and processes. • Trusted Introducer : • Listed (support from two) • Accredited (fee ~1000 EUR/year) • Certified (SIM3 Model 45 parameters) • TRANSITS I and II (discount for TI members) • Recognized by ENISA / FIRST • Regular collaborations and co-location of meetings. 5

  6. Security landscape of GÉANT Ass. NREN space Security space TF-MSP SIG-ISM ENISA Technical penetration TF-NOC TF-CSIRT (SIG-NOC) TI TRANSITS FIRST 6

  7. How to continue... • SIG-NOC from April 2014 • Develop training course(s) for NOC personnel... • TRANSITS I (based on the survey results) • Plus advanced/recommended training(s) including... • ITIL ??? • .... • The aim would be to bring as many NOC personnel as possible up to the ”standard” level... • How to define the ”standard” level??? • Brainstorming maybe next time... • Develop a NOC registry... • What information is mandatory, recommended, optional ??? 7

Recommend


More recommend