Browse XSEDE Operations by Title

  • Slagell, Adam; Fleury, Terry (2019-09-25)
    The methodology and working documentation for performing the 2012 and 2015 XSEDE Security Risk Assessments.

    application/pdf

    application/pdfPDF (853kB)
  • Slagell, Adam (2015-05-01)
    The 2015 final report of a NIST 800-30 based risk assessment of the eXtreme Science and Engineering Discovery Environment (XSEDE).

    application/pdf

    application/pdfPDF (636kB)
  • Fleury, Terry (2019-09-25)
    The 2019 final report of a NIST 800-30 based risk assessment of the eXtreme Science and Engineering Discovery Environment (XSEDE).

    application/pdf

    application/pdfPDF (1MB)
  • XSEDE Architecture Team (2013-09-25)
    This documents Canonical Use Case 4, Interactive Login, for the XSEDE project architecture.

    application/pdf

    application/pdfPDF (921kB)
  • XSEDE Security Working Group (2014-04-29)
    Through acceptance of the XSEDE Level 1 SP Security Agreement and other contracts, providers of XSEDE central services agree to follow this security baseline document approved by the XSEDE Security Working Group (XSWoG). ...

    application/pdf

    application/pdfPDF (766kB)
  • XSEDE Security Working Group (2014-08-12)
    New version of document available: http://hdl.handle.net/2142/97877. Through acceptance of the XSEDE Level 1 SP Security Agreement and other contracts, providers of XSEDE central services agree to follow this security ...

    application/pdf

    application/pdfPDF (791kB)
  • (2015-04-30)
    This document defines a set of Common User Environment (CUE) variables for the XSEDE project. The CUE variables enable users to optionally set and add common environment variables to their interactive and batch environments ...

    application/pdf

    application/pdfPDF (754kB)
  • Hazlewood, Victor; Slagell, Adam; Marstellar, Jim; Lindsay, Susan (2017-08-23)
    Through acceptance of the XSEDE Level 1 SP Security Agreement and other contracts, providers of XSEDE central services agree to follow this security baseline document approved by the XSEDE Security Working Group (XSWoG). ...

    application/pdf

    application/pdfPDF (717kB)
  • (2022-04-04)
    Providers of XSEDE Enterprise Services (XES) shall follow this security baseline document de-veloped and maintained by the XSEDE Security Working Group (XSWoG) and approved by XSEDE management. Because of the natural trust ...

    application/pdf

    application/pdfPDF (857kB)
  • XSEDE Security Working Group (2015-01-01)
    The purpose of this agreement is to define the expectations and responsibilities of the XSEDE Level 1 service providers with respect to security and incident response. This agreement between these service providers and ...

    application/pdf

    application/pdfPDF (769kB)
  • XSEDE Security Working Group (2016-03-31)
    The purpose of this agreement is to define the expectations and responsibilities of the XSEDE Level 1 service providers with respect to security and incident response. This agreement between these service providers and ...

    application/pdf

    application/pdfPDF (700kB)
  • XSEDE Security Working Group (2019-02-15)
    The purpose of this agreement is to define the expectations and responsibilities of the XSEDE Level 1 service providers with respect to security and incident response. This agreement between these ser-vice providers and ...

    application/pdf

    application/pdfPDF (846kB)
  • XSEDE Security Working Group (2013-07-08)
    This is a set of standard security controls that are to be applied at each Level 1 Service Provider along with additional guidelines for securing XSEDE resources.

    application/pdf

    application/pdfPDF (116kB)
  • XSEDE Security Working Group (2015-03-20)
    This document describes the personal information collected by XSEDE and how XSEDE treats and handles such information.

    application/pdf

    application/pdfPDF (725kB)
  • (2012-02-22)
    The XSEDE Service Provider Software and Services Baseline describes the software and services that XSEDE service providers may, and in some cases must, deploy in their computational environments.

    application/pdf

    application/pdfPDF (1MB)
  • (2012-02-22)
    This document describes the technical security mechanisms currently in operation in XSEDE to support secure access to XSEDE resources. Currently, these mechanisms are all inherited from TeraGrid without modification for ...

    application/pdf

    application/pdfPDF (686kB)
  • XRAS Team (2013-09-25)
    This document describes the 10 Use Cases required for the XSEDE Resource Allocation Process.

    application/pdf

    application/pdfPDF (939kB)
  • XSEDE Security Working Group (2014-04-29)
    “Community user” logins present special accounting and security issues. This policy is designed to ensure that such users and logins are properly tracked and identified within the add-user process.

    application/pdf

    application/pdfPDF (783kB)
  • XSEDE Security Working Group (2014-01-16)
    “Community user” logins present special accounting and security issues. This policy is designed to ensure that such users and logins are properly tracked and identified within the add-user process.

    application/pdf

    application/pdfPDF (130kB)
  • XSEDE Security Working Group (2014-01-16)
    “Community user” logins present special accounting and security issues. This policy is designed to ensure that such users and logins are properly tracked and identified within the add-user process.

    application/pdf

    application/pdfPDF (131kB)