38,757
edits
(Importing a new version from external source) |
(Importing a new version from external source) |
||
Line 1: | Line 1: | ||
==Research team responsibilities: Security in the cloud== | ==Research team responsibilities: Security in the cloud== | ||
Research teams are responsible for security controls to protect the confidentiality, integrity, and availability of their research data | Research teams are responsible for | ||
* implementing security controls to protect the confidentiality, integrity, and availability of their research data; | |||
* installing, configuring, and managing their virtual machines, as well as their operating systems, services and applications; | |||
* [[Security_considerations_when_running_a_VM#Updating_your_VM|applying updates]] and security patches on a timely basis; | |||
* configuring security group rules that limit the services exposed to the Internet; | |||
* implementing and testing backup and recovery procedures; | |||
* ensuring the [https://en.wikipedia.org/wiki/Principle_of_least_privilege principle of least privilege] is followed when granting access. |