38,757
edits
(Updating to match new version of source page) |
(Updating to match new version of source page) |
||
Line 4: | Line 4: | ||
==Research team responsibilities: security in the cloud== | ==Research team responsibilities: security in the cloud== | ||
Research teams are responsible for security controls to protect the confidentiality, integrity, and availability of their research data. Each team is responsible for installing, configuring, and managing their virtual machines, as well as their operating systems, services, applications. They must [ | Research teams are responsible for security controls to protect the confidentiality, integrity, and availability of their research data. Each team is responsible for installing, configuring, and managing their virtual machines, as well as their operating systems, services, applications. They must [[Security_considerations_when_running_a_VM#Updating_your_VM|apply updates]] and security patches on a timely basis. They must configure security group rules that limit the services exposed to the Internet. They must ensure backup and recovery procedures are implemented and tested. They must ensure the [https://en.wikipedia.org/wiki/Principle_of_least_privilege principle of least privilege] is followed when granting access. | ||
==Cloud team responsibilities: security of the cloud== | ==Cloud team responsibilities: security of the cloud== | ||
Line 18: | Line 18: | ||
==Further resources== | ==Further resources== | ||
For more information please see the following resources: | For more information please see the following resources: | ||
* Compute Canada’s cloud service description | * [[Cloud|Compute Canada’s cloud service description]] | ||
* Cloud security considerations for research teams | * [[Security_considerations_when_running_a_VM|Cloud security considerations for research teams]] | ||
* | * [https://www.computecanada.ca/research-portal/information-security/terms-of-use/ Compute Canada’s Terms of Use] |