Computer Security: Our findings, your problem

At CERN, you are the one primarily responsible for the computer security of all accounts, devices, websites, computing services and control systems you own and manage. CERN’s Operational Circular No. 5 (OC5, aka the CERN Computing Rules) requires you to keep those computing resources secured and protected. An important, but also huge, task! So, let us help you.

Just for you, the IT department provides a wide variety of computing services: web content management suites like Drupal; databases on demand; communication platforms like Indico and Mattermost; storage systems (AFS, Ceph, EOS); standardised virtual images; and software development frameworks (Puppet, Jenkins, Jira, Git). Ideally, on the one hand, you take advantage of their service catalogue

/Public Release. This material comes from the originating organization and may be of a point-in-time nature, edited for clarity, style and length. View in full here.