This list of Frequently Asked Questions is provided to complement the information contained in the Sirtfi Trust Framework Document.

General Questions

General questions are listed on the public facing site: https://refeds.org/sirtfi/sirtfi-faqs 

 


Questions on Sirtfi Assertions

Operational Security [OS]

Q: Does this imply that only supported software, for which patches are actively supplied, should be used?

A: Many federated services within research and education rely on custom applications and development due to their age and complexity. Stipulating that only supported software be used may pose unnecessary obstacles for organisations joining the Sirtfi trust framework. OS2 implies that any software deployed by an organisation, custom or otherwise, must be actively maintained in the event that a vulnerability is identified.  

Q: What is a “timely manner”?

A: The definition of appropriate timescales will vary per organisation based on maturity of the services and resource availability. response time should be commensurate with the scale of the incident. 


Q: What can I do if somebody does not respond to me in a "timely manner"? 

A: Contact your Federation Operator who will decide the best course of action. Should an organisation be found not to comply with Sirtfi, their Sirtfi metadata extension will be removed.

Q: What is ITIL?

A: ITIL is a standardised glossary of definitions used within the IT community. It is referenced here to limit redefinition of accepted terms. https://www.axelos.com/Corporate/media/Files/Glossaries/ITIL_2011_Glossary_GB-v1-0.pdf

Q: Does this security incident response capability need to be documented?

A: Ideally this capability should be documented in the form of policies and procedures. For large organisations there is the expectation that a formalised capability exists. For smaller organisations it is possible that this capability is less formal and may simply be the availability of an individual to handle such incidents. The level of documentation available should be commensurate with the scale of the organisation and services.


Q: Should organisations have equivalent agreements with their subcontractors to ensure an incident response capability exists?

A: Best practice indicates that contracts with subcontractors should cover incident response. These contracts are out of scope in a federated context for the purposes of this framework. The Sirtfi trust framework could be used as a starting point for such contractual agreements.

Incident Response [IR]

Q: Will I need to use the TLP for all communication once I have agreed to Sirtfi?

A: The TLP should be used for federated incident response but there is no stipulation for other communication. All communication regarding federated incidents, i.e. incidents affecting the entity in the metadata, must have a traffic light colour assigned. Information on the protocol is widely available, e.g. https://en.wikipedia.org/wiki/Traffic_Light_Protocol

Traceability [TR]                                                                       

Q: How can I make sure that my logs are sufficient?

A: Check your logging configuration to make sure that you are storing timestamps and identifiers. It is important that these logs are available (or can easily be made available) to relevant personnel during incident response; ensure that your organisation has clear procedures on gaining access to logs for security purposes.

The following example is an appender to a logback.xml file as used at a typical Shibboleth IdP that employs central logging to yoursysloghost.foo.edu. This example ensures that the IP of the remote client is recorded and may be used as inspiration for IdPs looking to improve the usability of their logs.

<appender name="IDP_SYSLOG" class="ch.qos.logback.classic.net.SyslogAppender">
    <syslogHost>yoursysloghost.foo.edu</syslogHost>
    <facility>AUTH</facility>
    <port>514</port>
    <suffixPattern>[%thread] [%logger:%line] - [%mdc{idp.remote_addr}] %msg</suffixPattern>
</appender>

The following extract shows the modified root element of logback.xml to include IDP_SYSLOG.

<root>
    <level value="INFO" />
    <appender-ref ref="IDP_PROCESS" />
    <appender-ref ref="IDP_WARN" />
    <appender-ref ref="IDP_SYSLOG" />
</root>

 

Participant Responsibilities [PR]

Q: Does this AUP need to be specific for identity federation?

A: No, as long as all activity conducted at entities within the federation is covered by an AUP.