...
The Policy and Best Practice Harmonisation activity works on operational and security aspects and policies to complement the technical research work carried out in the architecture and pilot work packagesthe infrastructures, and delivers a set of recommendations and best good practices to implement a scaleable and cost-effective policy and operational framework for the integrated AAI. Following the Community First approach, and driven by the use cases from the AARC Pilots, the policy harmonisation task Community. Policy harmonisation produces both generic guidelines (such as on data protection and operational security and traceability for proxies, acceptable use policy matching, and trust and assurance models) as well as specific guidelines for communities that are implementing the Blueprint Architecture.
Note | ||||
---|---|---|---|---|
| ||||
There are monthly Policy Coordination Calls, currently supported by AARC TREE and the global community. You can of course review the notes at https://sharemd.nikhef.nl/s/gfrboBQm-, but are also warmly invoted invited to join the calls on the 3rd Monday of the month. You can find the call details at https://indico.nikhef.nl/category/101/ |
Current work items (supported by AARC TREE):
- AARC-G083 - Guidance for Notice Management by Proxies
- AARC-I082 - Operational Trust in Distributed Proxy scenarios (contextual framing document)
The context of the policy activities is continuously evolving, includingIn AARC, we place primary focus on a selected set of elements that are currently the most pressing for either communties or generic Infrastructure AAIs:
- Security Incident Response in federated environments
- including guidelines on how to property protect your community attribute system
- and how to prepare and what to do in case of incidents
- traceability of events through a (network of) AARC BPA Proxies
- Service- and Infrastructure-centric policy support, including
- e-Researcher centric policies,
- simplified policy development kti kit also for smaller and mid-sized communities
- alignment of Acceptable Use Policies
- Assurance Level baseline and differentiated assurance profiles (alongside a self-assessment tool) including the use of government e-ID for step-up of assurance
- untangling identity assurance framework complexity
- novel federation models and trust paths (e.g. in OpenID Connect Federation)
- Engagement and coordination with FIM4R and the global community
- Support for Infrastructures and Communities with the Policy Development Kit (PDK)
...