To maintain a safe and trusted compute and data storage platform, RCC's security infrastructure includes the following measures:
- RCC has a curated and regularly audited Access Control List (ACL) which protects our systems. For information on ACLs, refer to NIST and IBM.
- RCC has physical security in our data center. The data center is in a secure building in Innovation Park, and access to the facility is restricted to only those with a valid and pre-approved swipe card.
- RCC systems have a firewall in-place. The firewall is configured for every one of our nodes.
- RCC networks have access filters in-place for multiple layers on our network to prevent unauthorized access.
- In order to access any RCC system, users must first be connected to the FSU VPN or be physically present on campus. Both methods require valid and active FSUID credentials. Additionally, users must sign up for an RCC account using their FSUID credentials. This is a separate account for the user's FSUID.
- Access to storage volumes (parallel storage and archival storage) is restricted to dedicated groups, and membership is controlled by the principal investigator (PI) or delegate.
- RCC adheres to best practices for Linux security measures.
While RCC staff work to provide as much security as we are able to for our users, users are still required to adhere to all rules listed in the RCC policies.
If your data providers or grant officer requires more specific information, please contact us: email@example.com