- IDEALS Home
- →
- XSEDE: Extreme Science and Engineering Discovery Environment
- →
- XSEDE Operations
- →
- Browse XSEDE Operations by Title
Browse XSEDE Operations by Title
Now showing items 1-20 of 45
-
(2019-09-25)The methodology and working documentation for performing the 2012 and 2015 XSEDE Security Risk Assessments.
application/pdf
PDF (853kB)
-
(2015-05-01)The 2015 final report of a NIST 800-30 based risk assessment of the eXtreme Science and Engineering Discovery Environment (XSEDE).
application/pdf
PDF (636kB)
-
(2019-09-25)The 2019 final report of a NIST 800-30 based risk assessment of the eXtreme Science and Engineering Discovery Environment (XSEDE).
application/pdf
PDF (1MB)
-
(2013-09-25)This documents Canonical Use Case 4, Interactive Login, for the XSEDE project architecture.
application/pdf
PDF (921kB)
-
(2014-04-29)Through acceptance of the XSEDE Level 1 SP Security Agreement and other contracts, providers of XSEDE central services agree to follow this security baseline document approved by the XSEDE Security Working Group (XSWoG). ...
application/pdf
PDF (766kB)
-
(2014-08-12)New version of document available: http://hdl.handle.net/2142/97877. Through acceptance of the XSEDE Level 1 SP Security Agreement and other contracts, providers of XSEDE central services agree to follow this security ...
application/pdf
PDF (791kB)
-
(2015-04-30)This document defines a set of Common User Environment (CUE) variables for the XSEDE project. The CUE variables enable users to optionally set and add common environment variables to their interactive and batch environments ...
application/pdf
PDF (754kB)
-
(2017-08-23)Through acceptance of the XSEDE Level 1 SP Security Agreement and other contracts, providers of XSEDE central services agree to follow this security baseline document approved by the XSEDE Security Working Group (XSWoG). ...
application/pdf
PDF (717kB)
-
(2022-04-04)Providers of XSEDE Enterprise Services (XES) shall follow this security baseline document de-veloped and maintained by the XSEDE Security Working Group (XSWoG) and approved by XSEDE management. Because of the natural trust ...
application/pdf
PDF (857kB)
-
(2015-01-01)The purpose of this agreement is to define the expectations and responsibilities of the XSEDE Level 1 service providers with respect to security and incident response. This agreement between these service providers and ...
application/pdf
PDF (769kB)
-
(2016-03-31)The purpose of this agreement is to define the expectations and responsibilities of the XSEDE Level 1 service providers with respect to security and incident response. This agreement between these service providers and ...
application/pdf
PDF (700kB)
-
(2019-02-15)The purpose of this agreement is to define the expectations and responsibilities of the XSEDE Level 1 service providers with respect to security and incident response. This agreement between these ser-vice providers and ...
application/pdf
PDF (846kB)
-
(2013-07-08)This is a set of standard security controls that are to be applied at each Level 1 Service Provider along with additional guidelines for securing XSEDE resources.
application/pdf
PDF (116kB)
-
(2015-03-20)This document describes the personal information collected by XSEDE and how XSEDE treats and handles such information.
application/pdf
PDF (725kB)
-
(2012-02-22)The XSEDE Service Provider Software and Services Baseline describes the software and services that XSEDE service providers may, and in some cases must, deploy in their computational environments.
application/pdf
PDF (1MB)
-
(2012-02-22)This document describes the technical security mechanisms currently in operation in XSEDE to support secure access to XSEDE resources. Currently, these mechanisms are all inherited from TeraGrid without modification for ...
application/pdf
PDF (686kB)
-
(2013-09-25)This document describes the 10 Use Cases required for the XSEDE Resource Allocation Process.
application/pdf
PDF (939kB)
-
(2014-04-29)“Community user” logins present special accounting and security issues. This policy is designed to ensure that such users and logins are properly tracked and identified within the add-user process.
application/pdf
PDF (783kB)
-
(2014-01-16)“Community user” logins present special accounting and security issues. This policy is designed to ensure that such users and logins are properly tracked and identified within the add-user process.
application/pdf
PDF (130kB)
-
(2014-01-16)“Community user” logins present special accounting and security issues. This policy is designed to ensure that such users and logins are properly tracked and identified within the add-user process.
application/pdf
PDF (131kB)
Now showing items 1-20 of 45