Top Banner
Data Protection Policy (DPP) (DRAFT) Kirsten Baxter, Karen Ernst (LS) Charlotte Maria Viala (HR) Tim Smith (IT/CIS) Derek Mathieson (GS/AIS) Computer Security Team ACCU 2012/9/5
14

Data Protection Policy (DPP ) (DRAFT)

Feb 26, 2016

Download

Documents

yanni

Data Protection Policy (DPP ) (DRAFT). Kirsten Baxter, Karen Ernst (LS) Charlotte Maria Viala (HR) Tim Smith (IT/CIS) Derek Mathieson (GS/AIS) Computer Security Team ACCU 2012/9/5. Do we lack a DPP?. ~/. ssh /FILE like ~/. ssh / id_dsa ~/. ssh /identity ~/. ssh / id_rsa ~/. globus /FILE - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Data  Protection Policy (DPP ) (DRAFT)

Data Protection Policy (DPP)(DRAFT)

Kirsten Baxter, Karen Ernst (LS)Charlotte Maria Viala (HR)

Tim Smith (IT/CIS)Derek Mathieson (GS/AIS)Computer Security Team

ACCU 2012/9/5

Page 2: Data  Protection Policy (DPP ) (DRAFT)

Do we lack a DPP?

~/.ssh/FILE like~/.ssh/id_dsa~/.ssh/identity~/.ssh/id_rsa

~/.globus/FILE~/.gnupg/FILE~/.mozilla/FILE

~/.cvspass~/.gitconfig~/.*htpass* ~/*htpass*~/.netrc~/.pine.pwd

~/.gnome2/keyrings ~/.kde/share/apps/kwallet/~/.subversion/auth/simple/

~/private

Page 3: Data  Protection Policy (DPP ) (DRAFT)

Do we lack a DPP?

Page 4: Data  Protection Policy (DPP ) (DRAFT)

Do we lack a DPP?

Page 5: Data  Protection Policy (DPP ) (DRAFT)

Data Protection Policy (DPP)CERN Privacy Statement describes how and when CERN collects, uses and shares

information when you use CERN's computing facilities; and, how CERN protects personal data stored in CERN's computing facilities.

Data Classification Policy (DCP) The general classification scheme for all data that are stored and/or processed in electronic form.

Data Storage Policy (DSP) The rules under which data must be stored.Data Access Policy (DAS) The rules under which data can be accessed.Data Transfer Policy (DTP) The rules under which data can be (digitally)

transferred between data stores.

Data Destruction Policy (DDP) The rules under which digital media must be wiped or destroyed such that any trace of data has disappeared from that media.

Goal: Pragmatic, compact, applicable. Linked to AC10+.

Page 6: Data  Protection Policy (DPP ) (DRAFT)

Data Classification Policy (DCP)• "Sensitive Data": Data is highly confidential; disclosure would compromise

personal data privacy or/and could cause damage to CERN or CERN's reputation or impede the work of CERN; data must be encrypted or equally secured for storage and in transit; data must be protected by login; authorization is typically limited to named individuals, who have unrestricted access for operational purposes, and to specific groups, who have restricted access subject to case-by-case control procedures.

• "Restricted Data": Data is confidential; circulation of data is required for operational purposes but wide-spread disclosure is unacceptable; data must be protected by login; authorization is limited to named individuals or specific groups, who have access for operational purposes.

• "Internal Data": Data is not confidential as such, but is intended for an internal audience only; external disclosure is undesired; data must be protected by login; audience is "CERN", i.e. all Members of the Personnel.

• "Public Data": Data intended for disclosure; audience is unlimited.• (We avoid using “confidential” as it is inconsistently used at CERN)

See https://cern.ch/security/rules/en/dcp.shtml

Page 7: Data  Protection Policy (DPP ) (DRAFT)

Examples of Sensitive Data• Personal data: medical records; documents and forms leading to the decision

taking, in particular as regards recognition of merit (e.g. the MARS form) or disability or disciplinary sanctions; payment data; bank account details.

• Computing data: aggregated security data like login information, command line activity or network traffic; forensics data; AFS/DFS "private"-folders; e-mail folders; passwords, certificates and other credentials; certain LANDB data; complete records of incoming and/or outgoing calls.

• Financial and contractual data: credit card information; bids in response to price inquires and call for tenders; payment data; bank account details; e-banking; policies & procedures; performance indicators.

Page 8: Data  Protection Policy (DPP ) (DRAFT)

Examples of Restricted Data• Personal data: personal administrative file (in particular all documents certifying the

personal and professional situation of a MP like date-of-birth, marriage, divorce certificates; administrative decisions as to assignment of functions, change of department, recognition of merit etc.), sex, nationality, private address & telephone number, employment applications and contract information, salary, salary position, CERN ID; decisions following a disciplinary procedure (issue of warning/reprimand or other disciplinary sanctions) and decisions on the recognition of a disability; staff association membership; the "Pension Fund file".

• Computing data: AFS/DFS user spaces; MAC addresses; analysis software; elogbooks; accounting information for professional usage of a service, e.g. access to buildings or Grid resources; video surveillance streams (live and archive).

• Documents: papers/analyses in draft; operations manuals; meeting minutes; internal memos; invention disclosure; patents (before publication); official letters.

• Financial and contractual data: budget information and budget plans; team accounts; information covered by non-disclosure agreements (NDAs); CERN issued price inquires and call for tender documents (after market survey); offers; orders; contracts; IT documents (including list of suppliers); supplier invoices; accounting entries; requests for funds (CERN invoices); bank contracts; Knowledge Transfer contracts; sales reports; policies & procedures; performance indicators; Qualiac DB.

Page 9: Data  Protection Policy (DPP ) (DRAFT)

Examples of Internal Data• Personal data: preferred language; CERN ID photo; direct contact information like

building and office information, e-mail addresses, telephone numbers (see e.g. the CERN phonebook ).

• Computing data: account names, account details (see e.g. CERN Account Management ); WebReq device information; scans of number plates.

• Documents: internal notes; non-public CERN policies; manuals; internal vacancies.

• Financial and contractual data: certain AIS documents (like DAI, TID, JOB, SHIP, MAT) where the objective is to show CERN contributors where money is spent; supplier database; financial rules; purchasing reports; some finanical committee documents.

Page 10: Data  Protection Policy (DPP ) (DRAFT)

Examples of Public Data• Personal data: name, first name, CERN organization unit, institute affiliation or

experiment, roles (DH, GL, SL, CSO, GLIMOS, SLIMOS, TSO, DSO, DPO, ...); generic contact information like P.O. box number, e-mail addresses, telephone numbers.

• Computing data: AFS/DFS "public"-folders; software under copyleft license; public web-sites.

• Documents: official CERN publications; papers; patents (after publication); Knowledge Transfer reports; information about ILO; this policy.

• Financial and contractual data: vacancies; the Staff Rules and Regulations; Member State documents (once published); financial accounts; market surveys; finanical committee documents.

Have a look through the examples: https://cern.ch/security/rules/en/dcp.shtmlComments welcome!!!

Page 11: Data  Protection Policy (DPP ) (DRAFT)

Consolidation ofCERN Computing Accounts

Paolo Tedesco, Emmanuel Ormancey (IT/OIS)Computer Security Team

ACCU 2012/9/5

Page 12: Data  Protection Policy (DPP ) (DRAFT)

CERN accounts for your dog• Today, there are no rules who can obtain a CERN primary computing

account. You just need to be registered with HR.• That account allows owning plenty of CERN computing resources (mailbox,

websites, other accounts, DFS/AFS disk space, …) and enables use of many CERN computing facilities (like LXPLUS, Windows PCs, INDICO, EDH, …).

• That account will remain being still valid for two months after leaving CERN.Even if you just worked two days at CERN painting a wall…

Thus, a clear definition is needed of who can use CERN computing facilities and who can own CERN computing resources and a proper split needs to be done between authentication & authorization.

In addition,• there is no consistent usage of service and secondary accounts,• and confusion what a “lightweight account” is;• there are plans to open CERN to accept external accounts (“ID Federation”)

Page 13: Data  Protection Policy (DPP ) (DRAFT)

• Today, we consider five groups of identities with different level of “trust”(so-called Levels-of-Assurance, LoA):

• Every computing service owner must define which LoA’s are authorized to use that service. P.ex. EDH can only be used by “CERN Registered” identities while the CERN market can be used by “Anonymous Identities”, too.

• In addition, a service owner can demand a second factor for authentication (e.g. the CERN access card, a USB token, a mobile phone)

Levels of assurance for identities

Identity Class LoA Origin/PurposeCERN Registered Highest Represents the currently active CERN primary accounts.CERN Trusted Medium-High Represents the currently active CERN secondary and service

accounts.HEP Trusted Medium HEP people registered in the CERN HR database, authenticating

using their HEP systems (through a Federation)Named Identity Low Ex-members of personnel, like retirees, former staff, etc. They

still have an entry in the CERN HR database but no CERN account anymore.

Anonymous Identity None Anonymous unverified people, like external/lightweight accounts, Facebook/Google accounts, Federation accounts not verified.

Page 14: Data  Protection Policy (DPP ) (DRAFT)

EligibilityREFEDS (Research and Education Federations) defines categories of personnel,see http://www.terena.org/activities/refeds/docs/ePSAcomparison_0_13.pdf)

Every computing service owner must define which categories are authorized to use that service or own resources. General rules:• Computing resources can be owned by: Member (incl. Employee, Student)• Computing services can be used by: Member, Student, Staff, Faculty• Those can opt-in using Computing Services: Affiliate

REFEDS CERN CERN HR categories

Employee MPE APPR, STAF/FELL

Staff Staff STAF/FELL, HONO, ENTC/TEMC

Student Student APPR, ADMI/CHIL/DOCT/STAG/STAP/SUMM/TECH/Trainee

Member MPE/MPA Employee, Student,CASS/CLAS/PDAS/PJAS/UPAS/USAS/USER/Visiting Scientist

Faculty “User” ADMI/CHIL/DOCT/STAG/STAP/SUMM/TECH/Trainee, CASS/CLAS/PDAS/PJAS/UPAS/USAS/USER/VisitingScientist, INST/PART/RETP/VISI

Affiliate Contributor CONF/FORM, COMT/CNST/ETAS/GUID/HOST/ILOF, RETR

Library Walk-In (unused)

Unpaid Workers (unused)

(Empty) External CLUB/KIND, FTMP, EXMP; all others