Skip to content

Tools for Security Analyis

NRP hosts a couple of monitoring and analysis tools to oversee security threats and misuses, and help investing security incidents. Here is a list of tools:

Dashboards

1. Authentik Administration Interface

NRP uses Authentik to manage authentication and authorization for users to access resources. The administration interface provides a centralized view over the general statistics of events, with a list of recent suspicious requests.

2. Elastic Syslog Dashboard

NRP hosts an Elastic instance which collects all system logs and security logs generated by all compute nodes in the cluster. It provides the current status of log events, and also allows system admins to query, visualize and analyze log items by fields or keywords. Especially, the dashboards provides a link to query SSH logins, which is useful to investigate malicious activities through the internet towards the nodes.

3. Falcosidekick UI

Falco is a cloud native security tool that NRP uses to monitor runtime security across hosts, containers, Kubernetes and cloud environments. NRP uses Falco to monitor malware such as crypto miners in user pods.

* Cluster admins have access to the username/password if they are stored as secretes in correstponding namespaces.

Applications

1. IPMI port scanner

NRP scans all nodes’ IPMI address periodically, and notifies site admins if the port is accessible from outside of the gateway.

2. JupyterHub security scanner

NRP scans all JupyterHub instances created by users, and make sure that they limit access to institutional accounts, and don’t allow anonymous users.

NSF Logo
This work was supported in part by National Science Foundation (NSF) awards CNS-1730158, ACI-1540112, ACI-1541349, OAC-1826967, OAC-2112167, CNS-2100237, CNS-2120019.