RCC Security Infrastructure

To maintain a safe and trusted compute platform, RCC's security infrastructure includes the following measures:

  • RCC has a curated and regularly audited Access Control List (ACL) which protects our systems.  For information on ACLs, refer to NIST and IBM.
  • RCC has physical security for our data center.  The data center is a separate building in innovation park and access to the building is restricted to only those with a valid and pre-approved swipe card.
  • RCC's systems all have a Firewall in place.  This firewall is in place on every one of our nodes.
  • RCC also has a set of access filters that are in place in multiple layers on our network to prevent unauthorized access.
  • In order to access any of RCC's systems, you must be connected to the FSU VPN or to the FSU Campus Wifi.  Both of these require valid and active FSUID usernames and passwords.  The FSUID password is also required to be updated on a regular basis.  See this ITS Article on Passwords.
  • In order to access any of RCC's systems, you must also have a valid and active FSUID username and a valid and approved RCC account which is authenticated using your FSUID and a password. This RCC password can be the same as your FSUID or different as RCC maintains its own LDAP authentication system; our advice is to use separate passwords.  See The LDAP Webpage and The Linux Documentation Project for more information on LDAP.
  • Access to Storage Volumes (parallel and archival storage) is restricted to dedicated groups where membership to said groups is controlled by the owner PI or delegate.
  • RCC adheres to Best Practices for Linux security measures.

While RCC works to provide as much security as we are able for our users, however, users are still required to adhere to all listed and applicable policies found in RCC Policies

If your data providers or grant officer requires more specific information, please contact us through our support webpage or by email.

Category