/
TAG Meeting 2025-02-13

TAG Meeting 2025-02-13

Agenda

  • Security

  • Retrieving a document’s ID only

  • Uniform Resource ID for integrations

Materials

Participants

Matt

Hoffman

Aeries Software

Steven

Arnold

Ed-Fi Alliance

Stephen

Fuqua

Ed-Fi Alliance

Jason

Hoekstra

Ed-Fi Alliance

Robert

Hunter

Ed-Fi Alliance

Vinaya

Mayya

Ed-Fi Alliance

Jeff

Putnam

Ed-Fi Alliance

Maria

Ragone

Ed-Fi Alliance

Mustafa

Yilmaz

Ed-Fi Alliance

Rosh

Dhanawade

Education Analytics

Jean-Francois

Guertin

EdWire

Ronald

Peasha

Infinite Campus

Sherod

Keen

Keen Logic

Dirk

Bradley

Michigan Data Hub

Joshua

Impson

Resultant

Josh

Bergman

Skyward

Wyatt

Cothran

South Carolina Department of Education

Katie

Favara

Texas Education Exchange

Robert

Nield

Unicon

Discussion

Security

  • Ideas and suggestions from the discussion:

    • Potentially useful term: “elevating best practices” puts more emphasis on the best practices coming from elsewhere.

    • Regularly ask the community about what they’re seeing in operations, gather reports, curate, share back with the community. To the extent that people are comfortable sharing about their deployment topologies.

    • Workgroup of security officers from the states?

  • Rate limiting

    • Also, unintentional (not malicious) Denial of Service from vendors.

    • Can the Discovery API show the rate information? Vendors only hear informally from states what the expected rates are.

    • TEA is the only one with the token rate limiting.

    • Vendors don’t want several different ways of handling rate limiting.

    • But there is a distinction: TEA is throttling for performance reasons. For security reasons, would not want to publish rate limits. Imagine a bad actor who slows their attack to just under the detection rate.

    • Opportunity to provide more guidance & best practices on handling rate limiting on both sides of the equation.

  • Large scale implementations often have federated sign-ins, where the hosting agency does not have control over enforcing MFA on the source system authentication providers.

  • Certification

    • Yes from one person: ask how vendors are obfuscating credentials, in both storage and display. Some source systems allow users to see and copy the Ed-Fi API credentials.

    • Comment that Admin API helps automate quick replacement of credentials when they are compromised.

    • Would there be different requirements for MSPs and integration partners? Maybe additional badging around SOC-2, FedRamp, TexRamp, penetration testing?

      • SOC-2 needs verifiable reporting, not just self assertion.

    • Certification should ask for a bare minimum level of security, and make it clear that this is truly “bare minimum” - less than what is actually recommended.

    • Are you protecting your own application’s credentials with proper hashing? Are you cycling your own tokens rather than trying to use tokens forever?

      • Editor’s note: good questions… as these are more about the security of the partner’s systems, not just protection of the Ed-Fi integration, do they go too far?

    • Rate limit is a best practice, not a certification topic.

    • Multiple source system vendors spoke encouragingly about this notion of asking security questions during certification.

    • What type of mechanisms could alert the broader community of threats others have run into (perhaps recurring?)

  • Provide a security checklist for integrators?

    • CIS benchmarks

  • Monitoring

    • Any logging stack should ideally have database errors in addition to the application logs.

    • Nice to have logging tied to credentials to identify individual integrations that may be “misbehaving.”

ID only retrieval

  • Field selectors as an alternative: harder to code for arbitrary field selectors.

  • Recommendation: make this is a different endpoint instead of a query string parameter, since the response has a different shape. i.e. GET /ed-fi/students/identifiers?<same query string parameters>

UniformID

  • Decentralized Id’s (DIDs) - which take advantage of zero knowledge proofs.

  • There might be something here, but need a more clear understanding of the pieces and how to utilize them.

Related content

MSP SIG - May 19, 2022
MSP SIG - May 19, 2022
More like this
TAG Meeting 2019-02-13
TAG Meeting 2019-02-13
More like this
TAG Meeting 2017-06-07
TAG Meeting 2017-06-07
More like this
TAG Meeting 2020-07-16
TAG Meeting 2020-07-16
More like this
TAG Meeting 2018-05-02
TAG Meeting 2018-05-02
More like this
RVWG 2019-08-05 Meeting notes
RVWG 2019-08-05 Meeting notes
More like this