Secure Login and Access

Securing access to your servers is critical because it is the first line of defence against unauthorised access and potential breaches. Most security incidents are caused by inadequate access controls, such as weak or default passwords, stolen credentials, and lack of...

Logging guidelines

Based on EGI Security Traceability and Logging Policy all certified EGI sites need to have a remote logging service in place. By storing logs remotely, you protect them from being tampered with or deleted by attackers who gain access to your systems. This ensures the...

Vulnerability in Slurm stepmgr subsystem CVE-2024-48936

Slurm version 24.05.4 was released, including a fix for a recently discovered security issue with the new stepmgr subsystem. A mistake in authentication handling in stepmgr could permit an attacker to execute processes under other users’ jobs. This is limited to...

EGI-CSIRT F2F meeting in Abingdon

In early October 2024, EGI-CSIRT met in Abingdon for a F2F meeting. In addition to the usual operational tasks, the meeting focused on international collaboration, future training, and improving the security of the EGI network of computing centres. To achieve this, we...

CRITICAL risk SAML Authentication bypass flaw

A critical risk vulnerability has been found in the omniauth_saml plugin (via the ruby-saml library), which is used by e.g. GitLab, allowing potential Authentication bypass. Update your GitLab instances urgently. Details are available in the SVG Advisory.