Enabling a coordinated response to security incidents for identity federations.

The AAF is requesting all organisations assert compliance with SIRTFI with respect to their Identity provider and all of the federated services they operate. Once your organisation has made this assertion, there a few simple steps to implement SIRTFI for your organisations Identity Provider.

To assert SIRTFI you must ensure your Identity provider is compliant (self-asserted) with nominated security contacts.

1. Ensure your service is compliant

SIRTFI identifies four areas shown in the graphic below for compliance each of which are described in detail in the The SIRTFI Framework.

2. Adding SIRTFI Security Contact information to your Identity Provider

Your organisation will have registered its security contacts and can be found in the AAF Federation registry at the organisational level. These contacts will automatically be used by the AAF for your identity provider. You can add additional security contact for your service by recording them in the Federation Registry. Note: you will require administrative access in FR to manage these contact details, contact support@aaf.edu.au to step up your administrators.

Steps to Add, Modify and Remove contacts within the AAF Federation Registry:

  • Log into the Federation Registry
  • Select your Identity provider from ones listed under “My Identity Providers”. If it is not listed you will need to contact support@aaf.edu.au and request administrative access.
  • Click on “Contacts Tab” to list the current contacts.
  • Click “Add Contact” and enter the search criteria. If your contact appears you can add them by clicking the “Add” button, if not select the “Create Contact” to add a new contact to the list. Note: After creating a new Contact you must then go back and search to add the contact.
  • Select the contact type from the drop down list and select “Security”.

Who to include as the security contact?

Your security contact may receive security related emails from time to time. You must select an appropriate person or group who can respond to such emails.

  • An appropriate security contact such as, an individual or generic contact, with existing security responsibility within an organisation related to your particular service.
  • Existing incident response structures, including CERTs, may be leveraged where available.

  • This contact will:
    • Use and respect the Traffic Light Protocol (TLP) during all incident response correspondence
    • Promptly acknowledge receipt of a security incident report
    • As soon as circumstances allow, investigate incident reports regarding resources, services, or identities for which they are responsible

Correspondence sent to your security contacts must not be publicly archived.