Version 2 (modified by bbaker, 11 years ago) (diff) |
---|
Overview
LSST has two apparently conflicting goals:
- Openness - public access to scientific data
- Security - reliable infrastructure and long-term data integrity
We will need to find a balance between these two, for each component and participant of LSST.
Realms
- Physical Security
- System-level Security
- Applications Security
- Public Access
Sites
- Mountaintop
- Network access strictly through base facility
- Important roles: Buffering, Network transfer to Base Facility
- Base facility (at La Serena)
- Who can access?
- No public access (all through collocated Data Access Center)
- Nightly processing (real-time)
- Data transferred to Archive Center
- Archive Center (at NCSA)
- Who can access?
- Data Archive
- Primary data processing
- Data access Centers
- Operated by LSST
- Collocated with the Archive Center (NCSA)
- Collocated with Base Facility (La Serena)
- San Diego
- Education and Public Outreach (EPO)
- Possibly others, independently funded
- Operated by LSST
Shared Facilities
Where LSST shares a site, we can expect to collaborate with other organizations on security, especially physical security.
- NCSA
- LSST will share a major new data center with NCSA, whose most notable resident will be the NSF supercomputing cluster Blue Waters which is expected to come online in 2011.
[Needed: list of other organizations whose facilities we will share]
Source Documentation
Attachments
-
Security Policy documents.zip
(455.4 KB) -
added by bbaker 11 years ago.
Generic Templates for Security Policy Documents