Body | Last challenge | Campaign name | Next challenge | Campaign name | Status |
---|---|---|---|---|---|
IGTF | November 2015 | October 2019 | IGTF-RATCC4-2019 | In progress | |
EGI | March 2019 | SSC6 19.03 | Completed |
Campaign information
Campaigns can target different constituencies and may overlap. The description of the constituency given here should be sufficient for a human to asses if there is a significant overlap in community, it need not be a detailed description or a list of addresses (which would be a privacy concern since this page is public). Challenges can also probe to different 'depths': anywhere from just checking if a contact address does not bounce, to testing if the organisation contacted can do system memory forensic analysis and engage effectively with LE. The proposed rough classification is now:
- ability to receive – mail does not bounce or phone rings
- automated answering – ticket system receipt or answering machine
- human responding – a human (helpdesk operative) answers trivially (e.g. name)
- human familiar with subject-matter responding – responsible person responds
- service analysis capability - a responsible person or team can investigate and resolve common incidents reported to the contact address (forensics, log processing, &c)
See also https://www.eugridpma.org/agenda/47/contribution/6/material/slides/0.pptx for some background.
Please do not post sensitive data to this Wiki - it is publicly viewable for now.
IGTF-RATCC4-2019
Campaign | IGTF-RATCC4-2019 |
---|---|
Period | October 2019 |
Initiator contact | Interoperable Global Trust Federation IGTF (rat@igtf.net) |
Target community | IGTF Accredited Identity Providers |
Target type | own constituency of accredited authorities |
Target community size | ~80 entities, ~60 organisations, ~50 countries/economic areas |
Challenge format and depth | email to registered public contacts expecting human response (by email reply) within policy timeframe |
Current phase | Preparatory communications sent |
Summary or report | not yet available |
EGI Security Service Challenge 6 (19.03)
Campaign | EGI-SSC6-19.03 |
---|---|
Period | March 2019 |
Initiator contact | EGI CSIRT (csirt@mailman.egi.eu) |
Target community | EGI Federation members: service providers and selected user communities |
Target type | own constituency of service providers |
Target community size | ~70 organisations, ~14 countries/IOs |
Challenge format and depth | simulated user-level system intrusion using (non-weaponized) crafted malware expecting communications with federation CSIRT, log analysis and correlation, and forensic investigation should follow established procedures and communications reponse deadlines |
Current phase | Completed |
Summary or report | summary available upon request description of challenge format and malware publicly available: https://indico.cern.ch/event/739878/contributions/3380156/attachments/1840866/3018165/gdb-20190508.pdf |