EGI Document 283-v8

EGI-CSIRT Critical Vulnerability Operational Procedure

Permalink:
https://documents.egi.eu/document/283
Document #:
EGI-doc-283-v8
Document type:
Submitted by:
Linda Cornwall
Updated by:
Linda Cornwall
Document Created:
15 Dec 2010, 14:36
Contents Revised:
14 Mar 2011, 17:18
Metadata Revised:
25 Jan 2012, 19:30
Viewable by:
  • Public document
Modifiable by:

Quick Links:
Latest Version

Other Versions:
EGI-doc-283-v9
02 Nov 2015, 12:32
EGI-doc-283-v7
14 Mar 2011, 15:01
EGI-doc-283-v6
11 Mar 2011, 17:12
EGI-doc-283-v5
14 Feb 2011, 15:43
EGI-doc-283-v4
17 Jan 2011, 17:26
EGI-doc-283-v3
05 Jan 2011, 16:45
EGI-doc-283-v2
21 Dec 2010, 12:00
EGI-doc-283-v1
15 Dec 2010, 14:36
Abstract:
In order to prevent incidents, it is important to ensure that operational action is taken in a timely manner when a security problem has been found and a solution identified. A critical security problem is one where it is considered that urgent action needs to be taken, in order for both individual sites and the infrastructure as a whole to be secure. The most common type of critical security problem is where a software vulnerability has been found, and assessed as ‘critical’.
After a problem has been assessed as critical, and a solution is available then sites are required to take action. This document primarily defines the procedure from this time, where sites are asked to take action, and what steps are taken if they do not respond or do not take action.
If a site fails to take action, this may lead to site suspension by removing the site from the resource information system as defined in appropriate policy documents.
Referenced by:

DocDB, Contact: Document Database Administrators