Quantcast
Channel: News for CERN Community feed
Viewing all articles
Browse latest Browse all 3489

Revised computer security rules

$
0
0
Revised computer security rules

At its second meeting, the Computer Security Board has formally approved several Subsidiary Rules to the Use of CERN computing facilities (Operational  Circular No. 5, OC5) related to Identities, Authentication & Authorization (IAA). The approved rules (IAA2/3/4/6/7) are now documented on the website of CERN's Computing Rules (https://cern.ch/ComputingRules).

At its third meeting, the Computer Security Board has formally approved several Subsidiary Rules to OC5 related to Endpoints (EPT) and Software Restrictions (SWR). The approved rules (EPT1/2/4/5/6 and SWR2/3) are now documented on the website of CERN's Computing Rules (https://cern.ch/ComputingRules).

For more information, read this article: Computer Security: Security Rules revised

ndinmore
Publication Date

Viewing all articles
Browse latest Browse all 3489

Trending Articles