SlideShare uma empresa Scribd logo
1 de 33
Assurance Requirements for
e-Infrastructure Services
Martin Hamilton
Loughborough University /
HPC Midlands
Cloudy With a Chance of Rootkits
Martin Hamilton
Loughborough University /
HPC Midlands
Topics
1. What is e-Infrastructure?
2. Barriers to Adoption
3. Opening Pandora’s Box

4. Conclusions
Topics
1. What is e-Infrastructure?
2. Barriers to Adoption
3. Opening Pandora’s Box

4. Conclusions
1. What is e-Infrastructure?
—Research community
context:
HPC, SKA, LHC, DLS, NGS
and other TLAs
—Industrial context:
TSB Catapults, BIS/EPSRC
supercomputer
centres, “on ramps” for
SMEs
1. What is e-Infrastructure?
[http://goo.gl/fIpA7R]
1. What is e-Infrastructure?
Case Study - HPC Midlands:
—BIS/EPSRC regional centre
—3,000 core supercomputer
—Expertise from Loughborough
University & University of
Leicester
—Software from leading ISVs
—Flexible usage model for use
by research and industry
1. What is e-Infrastructure?
Case Study - HPC Midlands:
—BIS/EPSRC regional centre
—3,000 core supercomputer
—Expertise from Loughborough
University & University of
Leicester
—Software from leading ISVs
—Flexible usage model for use
by research and industry
1. What is e-Infrastructure?
1. What is e-Infrastructure?
1. What is e-Infrastructure?
Not just HPC:
- Bioinformatics
- Diamond Light
Source, SKA etc
- Major capital kit at
Institutions
- But not just kit?
- Open Access Pubs
- Open Data
- Software
Topics
1. What is e-Infrastructure?
2. Barriers to Adoption
3. Opening Pandora’s Box

4. Conclusions
2. Barriers to Adoption

Picture credits: CC-BY-NC by Flickr user ladybeames; Peter Strutton, HPC Midlands
2. Barriers to Adoption - Awareness
equipment.data.ac.uk
Kit Catalogue™ – kitcatalogue.com

Key question:
What are the boundaries
of e-Infrastructure?
2. Barriers to Adoption - Awareness
2. Barriers to Adoption - Awareness
2. Barriers to Adoption - Awareness
2. Barriers to Adoption - Training
2. Barriers to Adoption - Training
- Typically supply led
- Inflexible timing
- Prohibitively
expensive for SMEs
- Ad-hoc engagement
with ISVs
- Where is the MOOC?
2. Barriers to Adoption - Assurance
Challenging
preconceptions:
—“Supercomputing is just for
rocket scientists”
—“Academic services are
inherently insecure”
—“Legal would never sign off
on anything like this”
—“It’s just too hard to satisfy
assurance requirements”
Photo credit: CC-BY-NC by Flickr user justin_case
2. Barriers to Adoption - Assurance
Challenging preconceptions:
—Common off-the-shelf packages
have HPC solver capability, e.g.
FLUENT, NASTRAN, MATLAB
—Pen testing / audit tools don’t
care if you are an academic site
—Locking systems down is hard
work – get over it
—FTSE100 firms’ have similar
requirements to research and
education organizations
Photo credit: CC-BY-NC by Flickr user justin_case
2. Barriers to Adoption - Assurance
Challenging preconceptions:
—Common off-the-shelf packages
have HPC solver capability, e.g.
FLUENT, NASTRAN, MATLAB
—Pen testing / audit tools don’t
care if you are an academic site
—Locking systems down is hard
work – get over it
—FTSE100 firms’ have similar
requirements to research and
education organizations
Photo credit: CC-BY-NC by Flickr user justin_case
Topics
1. What is e-Infrastructure?
2. Barriers to Adoption
3. Opening Pandora’s Box

4. Conclusions
3. Opening Pandora’s Box
3. Opening Pandora’s Box
—Who makes the agreement?
—Dedicated special purpose vehicle, spin-out
company, cost sharing groups, VAT exemption etc

—What does it look like?
—Guaranteed turnaround time?
—Reducing the friction

—Compliance challenges
—ISO 27002, CESG InfoSec, physical security (e.g.
LPS 1175), CIS audit tool, pen testing / auditing
3. Opening Pandora’s Box
—Who makes the agreement?
—Dedicated special purpose vehicle, spin-out
company, cost sharing groups, VAT exemption etc

—What does it look like?
—Guaranteed turnaround time?
—Reducing the friction

—Compliance challenges
—ISO 27002, CESG InfoSec, physical security (e.g.
LPS 1175), CIS audit tool, pen testing / auditing
3. Opening Pandora’s Box

Sample security audit tool output from http://benchmarks.cisecurity.org/
3. Opening Pandora’s Box
—Relationship with customer networks
—Firewall traversal, double NAT, outbound access to
service, inbound access to license servers, double
encryption? (VPN + ssh)

—What would root do?
—Remove unnecessary permissions, turn off unused
services, is command line access even necessary?

—Connectivity
—Online access vs. sneakernet, remote visualization
requirement, JANET connectivity + AAA support
through Moonshot
Topics
1. What is e-Infrastructure?
2. Barriers to Adoption
3. Opening Pandora’s Box

4. Conclusions
4. Conclusions

Photo credit CC-BY-NC Flickr user brianklug
4. Conclusions

Photo credit CC-BY-NC Flickr user brianklug
4. Conclusions
—More disciplined approach to contractual
relations, technical aspects of service provision
—Requirement for certain public sector data, e.g. NHS
patient records

—Similar considerations around regional shared
services as for generic “cloud” providers
—Opportunity to set common expectations around
levels and types of service
—Migration between service providers and marketplace
for e-Infrastructure services
Cloudy With a Chance of Rootkits
Martin Hamilton
@martin_hamilton
m.t.hamilton@lboro.ac.uk

Mais conteúdo relacionado

Semelhante a Cloudy with a Chance of Rootkits - Assurance Requirements for e-Infrastructure Services

e-Discovery_2_Cloud_v5
e-Discovery_2_Cloud_v5e-Discovery_2_Cloud_v5
e-Discovery_2_Cloud_v5
Steve Markey
 
SplunkLive! Customer Presentation – UMCP
SplunkLive! Customer Presentation – UMCPSplunkLive! Customer Presentation – UMCP
SplunkLive! Customer Presentation – UMCP
Splunk
 
2015 04 bio it world
2015 04 bio it world2015 04 bio it world
2015 04 bio it world
Chris Dwan
 

Semelhante a Cloudy with a Chance of Rootkits - Assurance Requirements for e-Infrastructure Services (20)

Offensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agendaOffensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agenda
 
Offensive cyber security engineer
Offensive cyber security engineerOffensive cyber security engineer
Offensive cyber security engineer
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updated
 
e-Discovery_2_Cloud_v5
e-Discovery_2_Cloud_v5e-Discovery_2_Cloud_v5
e-Discovery_2_Cloud_v5
 
Cloud bursting methodology
Cloud bursting methodologyCloud bursting methodology
Cloud bursting methodology
 
To cloud or not to cloud
To cloud or not to cloudTo cloud or not to cloud
To cloud or not to cloud
 
To Cloud or Not To Cloud
To Cloud or Not To CloudTo Cloud or Not To Cloud
To Cloud or Not To Cloud
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 
SplunkLive! Customer Presentation – UMCP
SplunkLive! Customer Presentation – UMCPSplunkLive! Customer Presentation – UMCP
SplunkLive! Customer Presentation – UMCP
 
IT is Innovation in Technology
IT is Innovation in TechnologyIT is Innovation in Technology
IT is Innovation in Technology
 
2015 04 bio it world
2015 04 bio it world2015 04 bio it world
2015 04 bio it world
 
Managing Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your OrganizationManaging Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your Organization
 
CompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and TricksCompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and Tricks
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
 
Thesis Defense MBI
Thesis Defense MBIThesis Defense MBI
Thesis Defense MBI
 
Challenges in Practicing High Frequency Releases in Cloud Environments
Challenges in Practicing High Frequency Releases in Cloud Environments Challenges in Practicing High Frequency Releases in Cloud Environments
Challenges in Practicing High Frequency Releases in Cloud Environments
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
Future-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsFuture-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical Threats
 
Grid Middleware – Principles, Practice and Potential
Grid Middleware – Principles, Practice and PotentialGrid Middleware – Principles, Practice and Potential
Grid Middleware – Principles, Practice and Potential
 

Mais de Martin Hamilton

Mais de Martin Hamilton (20)

Keep taking the tablets? The graduation of the iPad generation
Keep taking the tablets? The graduation of the iPad generationKeep taking the tablets? The graduation of the iPad generation
Keep taking the tablets? The graduation of the iPad generation
 
The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018
The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018
The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018
 
The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...
The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...
The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...
 
Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...
Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...
Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...
 
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018From Blockchain to Brexit - edtech trends for 2018 - BETT 2018
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018
 
Martin Hamilton - Digital skills: You won't believe what happened next!
Martin Hamilton - Digital skills: You won't believe what happened next!Martin Hamilton - Digital skills: You won't believe what happened next!
Martin Hamilton - Digital skills: You won't believe what happened next!
 
Martin Hamilton - Librarians in Outer Space - CILIP invited talk
Martin Hamilton - Librarians in Outer Space - CILIP invited talkMartin Hamilton - Librarians in Outer Space - CILIP invited talk
Martin Hamilton - Librarians in Outer Space - CILIP invited talk
 
Martin Hamilton - The impact of technology on the higher education sector - L...
Martin Hamilton - The impact of technology on the higher education sector - L...Martin Hamilton - The impact of technology on the higher education sector - L...
Martin Hamilton - The impact of technology on the higher education sector - L...
 
Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...
Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...
Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...
 
Martin Hamilton - What did your AI make today? - BCS invited talk
Martin Hamilton - What did your AI make today? - BCS invited talkMartin Hamilton - What did your AI make today? - BCS invited talk
Martin Hamilton - What did your AI make today? - BCS invited talk
 
Blockchain in research and education - UKSG Webinar - September 2017
Blockchain in research and education - UKSG Webinar - September 2017Blockchain in research and education - UKSG Webinar - September 2017
Blockchain in research and education - UKSG Webinar - September 2017
 
HPC in the cloud comes of age - Red Oak HPC Seminar
HPC in the cloud comes of age - Red Oak HPC SeminarHPC in the cloud comes of age - Red Oak HPC Seminar
HPC in the cloud comes of age - Red Oak HPC Seminar
 
Imagining Mars University - Universities UK 2017 conference
Imagining Mars University - Universities UK 2017 conferenceImagining Mars University - Universities UK 2017 conference
Imagining Mars University - Universities UK 2017 conference
 
Back to the future - Future Proof IT 2017
Back to the future - Future Proof IT 2017Back to the future - Future Proof IT 2017
Back to the future - Future Proof IT 2017
 
Tech in exams - SQA Assessment Expert Group - June 2017
Tech in exams - SQA Assessment Expert Group - June 2017Tech in exams - SQA Assessment Expert Group - June 2017
Tech in exams - SQA Assessment Expert Group - June 2017
 
Through the Overton Window - Health Education England horizon scanning worksh...
Through the Overton Window - Health Education England horizon scanning worksh...Through the Overton Window - Health Education England horizon scanning worksh...
Through the Overton Window - Health Education England horizon scanning worksh...
 
A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...
A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...
A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...
 
Help! My robot is a teacher! - Future Edtech 2017
Help! My robot is a teacher! - Future Edtech 2017Help! My robot is a teacher! - Future Edtech 2017
Help! My robot is a teacher! - Future Edtech 2017
 
Towards a UK Edtech Strategy - Edtech Vision 2020
Towards a UK Edtech Strategy - Edtech Vision 2020Towards a UK Edtech Strategy - Edtech Vision 2020
Towards a UK Edtech Strategy - Edtech Vision 2020
 
Bridging the digital divide - Digital Skills Summit 2017
Bridging the digital divide - Digital Skills Summit 2017Bridging the digital divide - Digital Skills Summit 2017
Bridging the digital divide - Digital Skills Summit 2017
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Cloudy with a Chance of Rootkits - Assurance Requirements for e-Infrastructure Services

  • 1. Assurance Requirements for e-Infrastructure Services Martin Hamilton Loughborough University / HPC Midlands
  • 2. Cloudy With a Chance of Rootkits Martin Hamilton Loughborough University / HPC Midlands
  • 3. Topics 1. What is e-Infrastructure? 2. Barriers to Adoption 3. Opening Pandora’s Box 4. Conclusions
  • 4. Topics 1. What is e-Infrastructure? 2. Barriers to Adoption 3. Opening Pandora’s Box 4. Conclusions
  • 5. 1. What is e-Infrastructure? —Research community context: HPC, SKA, LHC, DLS, NGS and other TLAs —Industrial context: TSB Catapults, BIS/EPSRC supercomputer centres, “on ramps” for SMEs
  • 6. 1. What is e-Infrastructure? [http://goo.gl/fIpA7R]
  • 7. 1. What is e-Infrastructure? Case Study - HPC Midlands: —BIS/EPSRC regional centre —3,000 core supercomputer —Expertise from Loughborough University & University of Leicester —Software from leading ISVs —Flexible usage model for use by research and industry
  • 8. 1. What is e-Infrastructure? Case Study - HPC Midlands: —BIS/EPSRC regional centre —3,000 core supercomputer —Expertise from Loughborough University & University of Leicester —Software from leading ISVs —Flexible usage model for use by research and industry
  • 9. 1. What is e-Infrastructure?
  • 10. 1. What is e-Infrastructure?
  • 11. 1. What is e-Infrastructure? Not just HPC: - Bioinformatics - Diamond Light Source, SKA etc - Major capital kit at Institutions - But not just kit? - Open Access Pubs - Open Data - Software
  • 12. Topics 1. What is e-Infrastructure? 2. Barriers to Adoption 3. Opening Pandora’s Box 4. Conclusions
  • 13. 2. Barriers to Adoption Picture credits: CC-BY-NC by Flickr user ladybeames; Peter Strutton, HPC Midlands
  • 14. 2. Barriers to Adoption - Awareness equipment.data.ac.uk Kit Catalogue™ – kitcatalogue.com Key question: What are the boundaries of e-Infrastructure?
  • 15. 2. Barriers to Adoption - Awareness
  • 16. 2. Barriers to Adoption - Awareness
  • 17. 2. Barriers to Adoption - Awareness
  • 18. 2. Barriers to Adoption - Training
  • 19. 2. Barriers to Adoption - Training - Typically supply led - Inflexible timing - Prohibitively expensive for SMEs - Ad-hoc engagement with ISVs - Where is the MOOC?
  • 20. 2. Barriers to Adoption - Assurance Challenging preconceptions: —“Supercomputing is just for rocket scientists” —“Academic services are inherently insecure” —“Legal would never sign off on anything like this” —“It’s just too hard to satisfy assurance requirements” Photo credit: CC-BY-NC by Flickr user justin_case
  • 21. 2. Barriers to Adoption - Assurance Challenging preconceptions: —Common off-the-shelf packages have HPC solver capability, e.g. FLUENT, NASTRAN, MATLAB —Pen testing / audit tools don’t care if you are an academic site —Locking systems down is hard work – get over it —FTSE100 firms’ have similar requirements to research and education organizations Photo credit: CC-BY-NC by Flickr user justin_case
  • 22. 2. Barriers to Adoption - Assurance Challenging preconceptions: —Common off-the-shelf packages have HPC solver capability, e.g. FLUENT, NASTRAN, MATLAB —Pen testing / audit tools don’t care if you are an academic site —Locking systems down is hard work – get over it —FTSE100 firms’ have similar requirements to research and education organizations Photo credit: CC-BY-NC by Flickr user justin_case
  • 23. Topics 1. What is e-Infrastructure? 2. Barriers to Adoption 3. Opening Pandora’s Box 4. Conclusions
  • 25. 3. Opening Pandora’s Box —Who makes the agreement? —Dedicated special purpose vehicle, spin-out company, cost sharing groups, VAT exemption etc —What does it look like? —Guaranteed turnaround time? —Reducing the friction —Compliance challenges —ISO 27002, CESG InfoSec, physical security (e.g. LPS 1175), CIS audit tool, pen testing / auditing
  • 26. 3. Opening Pandora’s Box —Who makes the agreement? —Dedicated special purpose vehicle, spin-out company, cost sharing groups, VAT exemption etc —What does it look like? —Guaranteed turnaround time? —Reducing the friction —Compliance challenges —ISO 27002, CESG InfoSec, physical security (e.g. LPS 1175), CIS audit tool, pen testing / auditing
  • 27. 3. Opening Pandora’s Box Sample security audit tool output from http://benchmarks.cisecurity.org/
  • 28. 3. Opening Pandora’s Box —Relationship with customer networks —Firewall traversal, double NAT, outbound access to service, inbound access to license servers, double encryption? (VPN + ssh) —What would root do? —Remove unnecessary permissions, turn off unused services, is command line access even necessary? —Connectivity —Online access vs. sneakernet, remote visualization requirement, JANET connectivity + AAA support through Moonshot
  • 29. Topics 1. What is e-Infrastructure? 2. Barriers to Adoption 3. Opening Pandora’s Box 4. Conclusions
  • 30. 4. Conclusions Photo credit CC-BY-NC Flickr user brianklug
  • 31. 4. Conclusions Photo credit CC-BY-NC Flickr user brianklug
  • 32. 4. Conclusions —More disciplined approach to contractual relations, technical aspects of service provision —Requirement for certain public sector data, e.g. NHS patient records —Similar considerations around regional shared services as for generic “cloud” providers —Opportunity to set common expectations around levels and types of service —Migration between service providers and marketplace for e-Infrastructure services
  • 33. Cloudy With a Chance of Rootkits Martin Hamilton @martin_hamilton m.t.hamilton@lboro.ac.uk