Cloud shared security responsibility model
|This site replaces the former Compute Canada documentation site, and is now being managed by the Digital Research Alliance of Canada. |
Ce site remplace l'ancien site de documentation de Calcul Canada et est maintenant géré par l'Alliance de recherche numérique du Canada.
Canada’s advanced research computing environment includes several cloud platforms for research. This document’s purpose is to describe the responsibilities of the cloud teams who administer our cloud platforms, the responsibilities of the many research teams who use these platforms, and shared responsibilities between both. “Security in the cloud” is the responsibility of our research teams. “Security of the cloud” is the responsibility of our our cloud teams.
Research team responsibilities: security in the cloud
Research teams are responsible for security controls to protect the confidentiality, integrity, and availability of their research data. Each team is responsible for installing, configuring, and managing their virtual machines, as well as their operating systems, services, applications. They must apply updates and security patches on a timely basis. They must configure security group rules that limit the services exposed to the Internet. They must ensure backup and recovery procedures are implemented and tested. They must ensure the principle of least privilege is followed when granting access.
Cloud team responsibilities: security of the cloud
Cloud Teams are responsible for protecting our cloud platforms. They are responsible for configuring and managing these compute, storage, database, and networking capabilities. They must apply updates and security patches applicable to the cloud platform on a timely basis. The environmental and physical security of the cloud infrastructure is also their responsibility.
Our cloud teams do not support or manage virtual machines. However, if a virtual machine is adversely impacting others, it may be shut down and locked by a cloud team. In these cases the research team may be asked to provide remediation plans before access to the virtual machine is restored. This is so that others are protected.
If you have any questions about this model please contact email@example.com.
For more information please see the following resources: