EGI Document 283-v9

EGI-CSIRT Critical Vulnerability Operational Procedure

Permalink:
https://documents.egi.eu/document/283
Document #:
EGI-doc-283-v9
Document type:
Other
Status:
DEPRECATED
Submitted by:
Linda Cornwall
Updated by:
Linda Cornwall
Document Created:
15 Dec 2010, 14:36
Contents Revised:
26 Jan 2012, 16:47
DB Info Revised:
02 Nov 2015, 12:32
Viewable by:
  • Public document
Modifiable by:
Other Versions:
EGI-doc-283-v8
25 Jan 2012, 19:30
EGI-doc-283-v7
14 Mar 2011, 15:01
EGI-doc-283-v6
11 Mar 2011, 17:12
EGI-doc-283-v5
14 Feb 2011, 15:43
EGI-doc-283-v4
17 Jan 2011, 17:26
EGI-doc-283-v3
05 Jan 2011, 16:45
EGI-doc-283-v2
21 Dec 2010, 12:00
EGI-doc-283-v1
15 Dec 2010, 14:36
Abstract:
New version of the procedure can be found under: https://wiki.egi.eu/wiki/SEC03


In order to prevent incidents, it is important to ensure that operational action is taken in a timely manner when a security problem has been found and a solution identified. A critical security problem is one where it is considered that urgent action needs to be taken, in order for both individual sites and the infrastructure as a whole to be secure. The most common type of critical security problem is where a software vulnerability has been found, and assessed as ‘critical’.
After a problem has been assessed as critical, and a solution is available then sites are required to take action. This document primarily defines the procedure from this time, where sites are asked to take action, and what steps are taken if they do not respond or do not take action.
If a site fails to take action, this may lead to site suspension by removing the site from the resource information system as defined in appropriate policy documents.
Referenced by:

DocDB Version 8.6.1, contact Document Database Administrators