Browse XSEDE Operations by Title

  • XSEDE Security Working Group (2019-02-15)
    Incident response guidelines are provided for: responders at the Level 1 Service Provider (SP) where the initial incident occurs ("Initial Responder"), responders at any other Level 1 SPs ("Secondary Re-sponders), XSEDE ...

    application/pdf

    application/pdfPDF (951kB)
  • Slagell, Adam (2012-10)
    This is the final report from the year-long risk assessment undertaken during XSEDE's first year of operation. It includes both risks and recommended remediations.

    application/pdf

    application/pdfPDF (479kB)Restricted Access
  • XSEDE Security Working Group (2014-05-05)
    The XSEDE Security Working Group (XSWoG) is responsible for creating security policies and procedures to be approved by the XSEDE Advisory Board, as well as helping to realize the goals set forth for XSEDE security operations. ...

    application/pdf

    application/pdfPDF (724kB)
  • XSEDE Security Working Group (2014-05-05)
    The XSEDE Security Working Group (XSWoG) is responsible for creating security policies and procedures to be approved by the XSEDE Advisory Board, as well as helping to realize the goals set forth for XSEDE security operations. ...

    application/pdf

    application/pdfPDF (724kB)
  • XSEDE Security Working Group (2013-08-26)
    The short document establishes the constituency of the XSEDE Security Working Group and defines its role with respect to XSEDE.

    application/pdf

    application/pdfPDF (72kB)
  • XSEDE Security Working Group (2013-02-07)
    The short document establishes the constituency of the XSEDE Security Working Group and defines its role with respect to XSEDE.

    application/vnd.openxmlformats-officedocument.wordprocessingml.document

    application/vnd.openxmlformats-officedocument.wordprocessingml.documentMicrosoft Word 2007 (131kB)
  • XSEDE Security Working Group (2014-08-12)
    The XSEDE Security Working Group (XSWoG) is responsible for creating security policies and procedures to be approved by the XSEDE Advisory Board, as well as helping to realize the goals set forth for XSEDE security operations. ...

    application/pdf

    application/pdfPDF (749kB)
  • XSEDE Security Working Group (2016-03-31)
    The XSEDE Security Working Group (XSWoG) is responsible for creating security policies and procedures to be approved by the XSEDE Advisory Board, as well as helping to realize the goals set forth for XSEDE security ...

    application/pdf

    application/pdfPDF (687kB)
  • XSEDE Security Working Group (2013-09-13)
    This guide is intended to assist new security personnel who are joining the XSEDE Security Working Group (XSWoG) to understand the policies and procedures in-place.

    application/pdf

    application/pdfPDF (140kB)
  • XSEDE Security Working Group (2017-11-07)
    XSEDE is a large, distributed enterprise with complex procedures and policies. This guide is intended to assist new security personnel who are joining the XSEDE Security Working Group (XSWoG) to understand the policies and ...

    application/vnd.openxmlformats-officedocument.wordprocessingml.document

    application/vnd.openxmlformats-officedocument.wordprocessingml.documentMicrosoft Word 2007 (474kB)
  • XSEDE Security Working Group (2014-05-05)
    XSEDE is a large, distributed enterprise with complex procedures and policies. This guide is intended to assist new security personnel who are joining the XSEDE Security Working Group (XSWoG) to understand the policies ...

    application/pdf

    application/pdfPDF (767kB)
  • XSEDE Security Working Group (2014-08-12)
    XSEDE is a large, distributed enterprise with complex procedures and policies. This guide is intended to assist new security personnel who are joining the XSEDE Security Working Group (XSWoG) to understand the policies and ...

    application/pdf

    application/pdfPDF (793kB)
  • XSEDE Security Working Group (2013-09-19)
    XSEDE is a large, distributed enterprise with complex procedures and policies. This guide is intended to assist new security personnel who are joining the XSEDE Security Working Group (XSWoG) to understand the policies ...

    application/pdf

    application/pdfPDF (138kB)
  • (2013-02-29)
    This document describes the XSEDE Service Providers (SPs) and Campus Bridging (CB) checklists to be used for integration and/or deployment of a new resource in XSEDE, to verify an existing resource at an SP site or to ...

    application/pdf

    application/pdfPDF (81kB)
  • (2012-05-11)
    The following describes the XSEDE Service Providers (SPs) and Campus Bridging (CB) checklists to be used for integration and/or deployment of a new resource in XSEDE, to verify an existing resource at an SP site or to ...

    application/pdf

    application/pdfPDF (81kB)
  • (2013-10-08)
    The document describes the XSEDE Service Providers (SPs) and Campus Bridging (CB) checklists to be used for integration and/or deployment of a new resource in XSEDE, to verify an existing resource at an SP site or to ...

    application/pdf

    application/pdfPDF (86kB)
  • (2014-01-21)
    The following describes the XSEDE Service Providers (SPs) and Campus Bridging (CB) checklists to be used for integration and/or deployment of a new resource in XSEDE, verify an existing resource at an SP site, to coordinate ...

    application/pdf

    application/pdfPDF (127kB)
  • (2012-05-11)
    The following describes the software and services for XSEDE Service Providers (SPs) and those interested in being a Campus Bridging provider by bridging into the XSEDE cyberinfrastructure.

    application/pdf

    application/pdfPDF (252kB)
  • (2013-02-19)
    This document describes the software and services for XSEDE Service Providers (SPs) and those interested in being a Campus Bridging provider by bridging into the XSEDE cyberinfrastructure.

    application/pdf

    application/pdfPDF (93kB)
  • (2014-05-01)
    The needs of a large project like XSEDE will change over its lifetime. New software will need to be added to the XSEDE architecture to meet the demands of changing user needs. Similarly, software can become obsolete and ...

    application/pdf

    application/pdfPDF (745kB)