-

This site is deprecated and will be decommissioned shortly. For current information regarding HPC visit our new site: hpc.njit.edu

ManagementGuideLines

From NJIT-ARCS HPC Wiki
Jump to: navigation, search

Purpose

This document outlines :

  1. The responsibilities of researchers that manage their own research computing devices (e.g., computers, network-attached storage) that are connected to the NJIT network.
  2. The role of IST in maintaining the integrity of researcher-managed devices and the data stored on those devices

Adherence to NJIT data security policy

Data stored on any device connected to the NJIT network must adhere to the guidelines for data security as stated in the NJIT data security policy at [policy not yet in place].

IST access

In order to assess the state of device and data security of researcher-owned devices that are connected to the NJIT network, all such devices will be remotely accessible by appropriate IST staff. These staff will have super-user privileges on these devices.

Researcher responsibilities

It is the responsibility of researchers managing their own devices to :

  • Apply security patches in a timely manner
  • Apply operating system patches on a quarterly basis
  • Set up firewall rules as appropriate
  • Ensure physical security
  • Restrict accounts to users who must use the device to do research
  • Patch, replace, or remove any installed software known to have security vulnerabilities
  • Install only open source or licensed software
  • Back up any local data of value to the researcher. Protect the security of these backups

Removal from NJIT network

Devices that are found to be not in compliance with these guidelines will be subject to being blocked from the NJIT network.