Message Boards Message Security Questions, Comments When a job is executed after submission under what user, or level of permission, is the job executed? It's not clear to me how users are to upload Kepler workflows, how is this done e.g. scp, web... |
Wiki Page Risk Assessment Project Sizing Background & Purpose# We perform a threat and risk assessment for XSEDE to: inform future security plans; prioritize resources of the security operations team and its activities; and demonstrate a... |
Wiki Page A Risk-based Security Program for XSEDE The Goal# Security Management is at the core of an organization's information security structure. As Shon Harris says, "Security management includes risk management, information security policies,... |