This is a website for an H2020 project which concluded in 2019 and established the core elements of EOSC. The project's results now live further in www.eosc-portal.eu and www.egi.eu

VM endorsers of the e-Infrastructure

IT Security Management (ISM) in EOSC-hub: policies and global trust

Thursday, October 11, 2018 - 11:30 to 16:00

The aims of IT Security Management (ISM) include the management of security risk, the maintenance of confidentiality, integrity and availability of services and data, the handling of security incidents, the prevention of incidents by handling vulnerabilities, and the definition of best practice together with appropriate dissemination and delivery of training courses. In the world of Open Science and in view of the ever-changing landscape of security threats on the Internet, ISM is an ongoing global challenge. Experience has shown that security and trust is best tackled in a collaborative way, especially as the Infrastructure security teams have to trust each other, to allow for the proper handling of those security incidents which spread between Infrastructures.

Towards cross infrastructure Operational Security in EOSC-hub

Tuesday, March 20, 2018 - 14:40 to 15:00

The EOSC-hub proposes a new vision to data-driven science, where researchers from all disciplines have easy, integrated and open access to the advanced digital services, scientific instruments, data, knowledge and expertise they need to collaborate to achieve excellence in science, research and innovation.

The process towards the integration of the different security activities will be supported through the development of harmonized policies and procedures, to ensure consistent and coordinated security operations across the services provided in the catalogue.

Coordinating the Operational Security in such a broad environment is a challenge. At the same time it offers many possibilities of a closer collaboration of the already existing security teams active in the distributed infrastructures.

The expertise built, and tools developed in response to specific problems in the different infrastructures can be used in cross-infrastructure co-operations. In this presentation we will present examples for possible collaborations in: Incident Prevention Incident Handling/Coordination * Security Training and Exercises