Date: Thu, 28 Mar 2024 12:52:49 +0100 (CET) Message-ID: <569922906.39.1711626769435@czmuims01.ops.egi.eu> Subject: Exported From Confluence MIME-Version: 1.0 Content-Type: multipart/related; boundary="----=_Part_38_198966038.1711626769434" ------=_Part_38_198966038.1711626769434 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Content-Location: file:///C:/exported.html
As a End user the following Policies and Procedures are relevant= to you.
Title | Approval status | Owner | Statement |
---|---|---|---|
Grid Policy on t= he Handling of User-Level Job Accounting |
APPROVED |
This document presents the minimum requirements and policy framework fo= r the handling of user-level accounting data created, stored, transmitted, = processed and analysed as a result of the execution of jobs on the Grid. | |
Security Policy Glossary of Terms= td> |
APPROVED |
This document provides a common reference for the meaning of various te= rms used in the context of the EGI Security Policy Group documents. As well= as defining terms, this glossary also limits the scope of meaning of terms= used in the security policy documents. | |
Security Policy for the Endorsement and Operation of Virtual Machine Ima= ges |
APPROVED |
This document describes the security-related policy requirements for th= e generation, distribution and operations of virtual machine (VM) images, a= s part of a trusted computing environment of the IT infrastructure. The aim= is to enable VM images to be generated according to best practices and to = be both trusted and operated elsewhere. | |
Policy on e-infrastructu= re Multi-User Pilot Jobs |
APPROVED |
Security policy for operation of multi-user pilot jobs. | |
VO Portal Policy |
APPROVED |
This security policy applies to all Portals operated by Virtual Organis= ations that participate in the e-Infrastructure. It defines the conditions = that apply to each of four different portal classes. | |
Acceptable Use Policy and Con= ditions of Use |
APPROVED |
The conditions of use described in the AUP have to be accepted by all U= sers during their registration as a user of the Infrastructure. | |
Policy on the Processing of Per= sonal Data |
APPROVED |
David Kelsey | This policy ensures that data collected as a result of the use of the I= nfrastructure is processed fairly and lawfully by Infrastructure participan= ts. |
Security Incident Response Policy= td> |
APPROVED |
Policy on handling security incidents. | |
e-infrastructure Security Policy |
APPROVED |
David Kelsey | Policy regulat= ing those activities of e-Infrastructure participants related to the securi= ty of e-Infrastructure services and resources. |
Title | Approval status | Owner | Statement |
---|---|---|---|
PROC14 VO Registration |
APPROVED |
The document describes the process of enabling a Virtual Organisation (V= O) on the EGI infrastructure. |
|
ISRM7 Creation = of a new support unit in the Helpdesk GGUS |
APPROVED |
Creating a new support unit in the EGI Helpdesk service (GGUS). |
|
PROC13 VO Deregistration |
APPROVED |
Alessandro Paolini |
A procedure describing how to deco= mmission a Virtual Organization currently registered in the EGI infrastruct= ure. |
SEC02 Software Vulnerability = Issue Handling |
APPROVED |
The purpose of the EGI Software Vulnerability group is "To minimize the = risk of security incidents due to software vulnerabilities" This document d= escribes how Software vulnerabilities reported are handled. |
|
SEC01 EGI CSIRT Secu= rity Incident Handling Procedure |
APPROVED |
CSIRT | This procedure is aimed at minimising the impact of security incidents = by encouraging post-mortem analysis and promoting cooperation between Resou= rce Centres. |
PROC20 Support for CVMFS replication across the EGI and OSG CVMFS service= s |
APPROVED |
Catalin Condurache |
The document describes the process= of enabling the replication of CVMFS spaces across OSG and EGI CVMFS infra= structures |
PROC22= Support for CVMFS replication across the EGI Infrastructure |
APPROVED |
Catalin Condurache |
The procedure describes the proces= s of creating a repository within the EGI CVMFS infrastructure for an EGI V= O |
SEC04 EGI CSIRT Operational Procedure f= or Compromised Certificates and Central Security Emergency suspension= td> |
APPROVAL REQ= UIRED |
CSIRT |
This procedure describes what should be done by the EGI CSIRT in the eve= nt of a compromised identity certificate, including long lived certificates= and proxies. This applies to robot certificates and service certificates a= s well as user certificates. This also includes what is done when certifica= tes are linked to security incidents. This procedure also addresses usage o= f Central Security Emergency suspension. The implications of a CA compromis= e are also briefly described. |
PROC16 Decommissioning of = unsupported software |
APPROVED |
Alessandro Paolini |
A procedure for removal of unsuppo= rted software from production infrastructure |