Computer Security: Our findings, your problem

At CERN, you are the one primarily responsible for the computer security of all accounts, devices, websites, computing services and control systems you own and manage. CERN's Operational Circular No. 5 (OC5, aka the CERN Computing Rules) requires you to keep those computing resources secured and protected. An important, but also huge, task! So, let us help you.

Just for you, the IT department provides a wide variety of computing services: web content management suites like Drupal; databases on demand; communication platforms like Indico and Mattermost; storage systems (AFS, Ceph, EOS); standardised virtual images; and software development frameworks (Puppet, Jenkins, Jira, Git). Ideally, on the one hand, you take advantage of their service catalogue

/Public Release. This material from the originating organization/author(s) might be of the point-in-time nature, and edited for clarity, style and length. Mirage.News does not take institutional positions or sides, and all views, positions, and conclusions expressed herein are solely those of the author(s).View in full here.