Info | ||
---|---|---|
| ||
This page has been deprecated. Please see Incident Handling for current information. |
Info | ||
---|---|---|
| ||
Note that this page contains general information about federated incident response. See Security Incident Response Trust Framework for Federated Identity (SIRTFI) Category for specific criteria for certification under the SIRTFI program (highly recommended). |
...
Federated identity introduces new challenges for security incident response. Federation participants should consider the impact of federated identity in their incident response practices and treat federated identity partners impacted by a security incident in a similar manner as they would local parties.
Tip | ||
---|---|---|
| ||
|
Table of Contents |
---|
Incident Response Policy
Goal of this Policy
...
Reporting a Security Incident
The following procedure assumes Federation participants have published one or more security Contacts in Metadata for the purposes of security incident response.
- A participant discovering a security incident should strive to notify any affected parties in the federation to the extent allowed by that participant's policies, relevant laws and resource constraints.
- Participants should maintain a current point of contact for security incident reporting (see "Security Contacts in Metadata" below).
- Participants, when discovering a security incident, should strive to report the incident to other affected participants at the provided point of contact for security incident response. For example:
- If an Identity Provider discovers a security incident that affects one or more Service Providers, it should strive to contact those Service Providers and share relevant information.
- If a Service Provider discovers a security incident that affects one or more Identity Providers, it should strive to contact those Identity Providers and share relevant information.
- If a security incident involves a user, the incident should be reported to that user's Identity Provider at the provided point of contact for security incident response.
- Participants should encrypt incident communications to prevent unauthorized disclosure.
- Service Providers have ultimate authority for access control for their services. A Service Provider may choose to locally de-authorize a user or Identity Provider for any reason, including containment of a security incident.
- Identity Providers have ultimate authority for access control to their services. An Identity Provider may choose to deny release of user identifiers and attributes to a Service Provider for any reason, including containment of a security incident.
- A user could be the originator of a security incident report if, for example, they find activity attributed to them at a given Service Provider for which they do not believe they are responsible. The user might report this to either the Service Provider or to their Identity Provider, but in either case, the participant receiving the security incident report should apprise the second participant of the report.
...
- Participants are expected to keep internal logs with accurate date/time stamps that allow for security incident response. For example, an Identity Provider should be able to identify the specific individual associated with an anonymised identity presented to a Service Provider.
- Participants are expected to retain such logs for whatever period of time organizational policy dictates or allows.
Security Contacts in Metadata
Federation participants should publish Contacts in Metadata for security incident response. For example:
...
<md:ContactPerson contactType="other"
xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata"
xmlns:ext="urn:mace:incommon:contactType"
ext:extendedType="urn:mace:incommon:contactType:security">
<md:EmailAddress>mailto:security@example.edu</md:EmailAddress>
<md:TelephoneNumber>999-999-9999</md:TelephoneNumber>
</md:ContactPerson>
...
- .
Acknowledgements
This material was originally developed by the CIC Identity Management Taskforce (see: CIC Federated Security Incident Response Policy).