wiki:SecurityEPO
Last modified 11 years ago Last modified on 07/10/2008 08:24:12 AM

Table of Contents

  1. Security Plan Outline
    1. Internal Outline for Systems
    2. Level of Detail
  2. Introduction
    1. Openness vs. Security
      1. Openness and Performance
    2. Attacks
    3. Purpose of this document
      1. Important Dates
    4. Partners and sponsoring institutions
    5. Scratch stuff
      1. Fairness
    1. Observatory Control System
  3. Archive Operations System (AOS)
    1. Introduction
    2. Responsibilities
    3. Physical Operating Environment
    4. System Descriptions
    5. Data Products
    6. Management, Operational, and Technical Controls Descriptions
      1. Access Control
    1. Distributed Processing System
    1. Community Service System
  4. Visitor Network
  5. Event Messaging Subsystem
    1. Introduction
      1. Design Choices
    2. 1. Responsibilities
    3. 2. Physical Operating Environment
    4. 3. System Descriptions
      1. 3.1. Event Brokers
        1. 3.1.1. Broker Authentication
      2. 3.2. Event Producers
        1. 3.1.2. Producer Authentication
        2. 3.1.3. Consumer Authentication
    5. 4. Management, Operational, and Technical Controls Descriptions
      1. 4.1. Access Control
      2. 4.2. Awareness and Training
      3. 4.3. Audit and Accountability
      4. 4.4. Configuration Management
      5. 4.5. Contingency Planning
      6. 4.7. Maintenance
      7. 4.8. Media Protection
      8. 4.9. Physical and Environmental Protection
      9. 4.10. Security Planning
      10. 4.11. Personnel Security
      11. 4.12. Risk Assessment
        1. False Message Injection
        2. Interruption
      12. 4.13. Systems and Services Acquisition
      13. 4.14. System and Communications Policy
      14. 4.15. System and Information Integrity
  6. Summit and Base Facility
    1. Overview
    2. Computer Security at the Summit and Base Facility
    3. Differences between Summit and Base Facility
  7. Archive Center
    1. Overview
  8. Data Access Centers
  9. Applications
    1. User Authentication and Authorization
    2. Trust of Services
    3. Data Integrity
      1. Transfer from Summit to Base
      2. Transfer from Base to Archive
      3. Transfer from Archive to DACs
      4. Transfer from DACs to Archive (Recovery)
  10. External Use Cases and Workflows
  11. Internal Use Cases and Workflows
      1. Telescope
      2. Camera Remote Access
  12. Security Threats

This page is part of the Security Outline.

Education and Public Outreach (EPO) Centers