...
Panel |
---|
Document Name: NCSA Security Monitoring Policy Approved: 2008 by the Office of the CIO |
Scope
This policy covers all users of NCSA production systems for external customers , and any system using NCSA datacenter networks. including Blue Waters.
NCSA Network Security Policy#HighPerformanceDatacenter(HPDC)Zone
Introduction & Purpose
The primary threat to the security of NCSA production systems comes from user "identity theft", often exposed as compromised user accounts and credentials. Within the existing HPC environments managed by NCSA, 25% of security incidents stem from user credentials becoming compromised and used by unauthorized persons for malicious purposes. This document details the policy covering the monitoring of user activity.
...
The NCSA support staff (e.g. system managers, networking and security teams) monitor all NCSA production systems and any system using NCSA datacenter networks or related resources. This extends to monitoring all user interactions with these resources including encrypted channels such as SSH. Secure communication channels may be modified to permit this monitoring to take place.
...