Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

BodyLast challengeCampaign nameNext challengeCampaign nameStatus
IGTFNovember 2015
October 2019IGTF-RATCC4-2019In progress
EGIMarch 2019SSC6 SSC 19.03 (8)

 (Completed
Trusted IntroducerAugust 2019TI Reaction TestJanuary 2019TI Reaction TestRepeats three times a year

...

EGI Security Service Challenge 6 (19.03)

CampaignEGI-SSC6SSC-19.03 (8)
PeriodMarch 2019us
Initiator contactEGI CSIRT (csirt@mailman.egi.eu)
Target communityEGI Federation members: service providers and selected user communities

Target type

own constituency of service providers
Target community size~70 organisations, ~14 countries/IOs
Challenge format and depth

simulated user-level system intrusion using (non-weaponized) crafted malware

expecting communications with federation CSIRT, log analysis and correlation, and forensic investigation

should follow established procedures and communications reponse deadlines

Current phaseCompleted
Summary or report

summary available upon request

description of challenge format and malware publicly available: https://indico.cern.ch/event/739878/contributions/3380156/attachments/1840866/3018165/gdb-20190508.pdf

TI Reaction Test

CampaignTI Reaction Test
PeriodAugust 2019
Initiator contactTrusted Introducer Team (ti@trusted-introducer.org)
Target communityTI Listed, Accredited and Certified Teams

Target type

R&E, military, commercial, government, e-infrastructure and national certs as per participation in TI.
Target community size363 teams (as at August 2019)
Challenge format and depth

Simple click link response to show that team has ability to respond quickly.  Team must have valid certificate to complete the response.

Current phaseCompleted
Summary or report

Results are available for participating teams only at: https://tiw.trusted-introducer.org/news/reaction-tests.html.