-
This site is deprecated and will be decommissioned shortly. For current information regarding HPC visit our new site: hpc.njit.edu
ManagementGuideLines
Purpose
This document outlines :
- The responsibilities of researchers that manage their own research computing devices (e.g., computers, network-attached storage) that are connected to the NJIT network.
- The role of IST in maintaining the integrity of researcher-managed devices and the data stored on those devices
Adherence to NJIT data security policy
Data stored on any device connected to the NJIT network must adhere to the guidelines for data security as stated in the NJIT data security policy at [policy not yet in place].
IST access
In order to assess the state of device and data security of researcher-owned devices that are connected to the NJIT network, all such devices will be remotely accessible by appropriate IST staff. These staff will have super-user privileges on these devices.
Researcher responsibilities
It is the responsibility of researchers managing their own devices to :
- Apply security patches in a timely manner
- Apply operating system patches on a quarterly basis
- Set up firewall rules as appropriate
- Ensure physical security
- Restrict accounts to users who must use the device to do research
- Patch, replace, or remove any installed software known to have security vulnerabilities
- Install only open source or licensed software
- Back up any local data of value to the researcher. Protect the security of these backups
Removal from NJIT network
Devices that are found to be not in compliance with these guidelines will be subject to being blocked from the NJIT network.