skip to main content
10.1145/3219104.3229246acmotherconferencesArticle/Chapter ViewAbstractPublication PagespearcConference Proceedingsconference-collections
extended-abstract

High Performance Computing Evaluate And Plan

Published:22 July 2018Publication History

ABSTRACT

Arcutek will develop a security service called "HEAP" or "HPC Evaluation And Plan" as a complete configuration of security solutions for connection, file ingress/egress, compute, data-at-rest and other infrastructure areas. Security for HPC environments is complex and requires a holistic approach to identify, protect, detect, respond and recover from security events. Some vendor-specific guides are available through the National Institute of Standards and Technology and the Center for Internet Security, but no government or industry plan completely encompasses the security of HPC architecture. We endeavor to research common off the shelf products and open source tools which would bring HPC components into compliance with the NIST 800-53A Revision 4 and the "Security Controls Catalog and Assessment Procedures."[1]

References

  1. National Institute of Standards and Technology Special Publication 800-53A Revision 4, Assessing Security and Privacy Controls in Federal Information Systems and Organization. 2014-12. Accessed: 2018-06-01. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. High-Performance Computing Security Workshop: 2018. https://www.nist.gov/news-events/events/2018/03/high-performance-computing-security-workshop Accessed: 2018- 06- 01.Google ScholarGoogle Scholar
  3. PILLITTERI, V., NIST Risk Management Framework Overview. 2018-03-28. https://www.nist.gov/sites/default/files/documents/2018/03/28/vickie_nist_risk_management_framework_overview-hpc.pdfGoogle ScholarGoogle Scholar
  4. Security Controls and Assessment Procedures for Federal Information Systems and Organizations Control Families. 2014-12. https://nvd.nist.gov/800-53/Rev4 Accessed: 2018- 06- 01.Google ScholarGoogle Scholar
  5. Access Control Family. 2014-12. https://nvd.nist.gov/800-53/Rev4/family/Access%20Control Accessed: 2018- 06- 01.Google ScholarGoogle Scholar
  6. A Free, Flexible, and Secure Way To Provide Multiple Factors of Authentication to Your Community. https://www.tacc.utexas.edu/-/a-free-flexible-and-secure-way-to-provide-multiple-factors-of-authentication-to-your-community Accessed: 2018- 06- 01.Google ScholarGoogle Scholar
  7. Galaxy. The Galaxy Project. 2018 https://www.usegalaxy.org/Google ScholarGoogle Scholar
  8. OSC OnDemand. Ohio Supercomputer Center. 2018. https://www.osc.edu/supercomputing/portalsGoogle ScholarGoogle Scholar
  9. National Institute of Standards and Technology Special Publication 800-30 Revision 1, Guide for Conducting Risk Assessments. 2014-09. Accessed: 2018-06-01.Google ScholarGoogle Scholar
  10. Security Content Automation Protocol. https://csrc.nist.gov/Projects/Security-Content-Automation-Protocol/SCAP-Content Accessed: 2018-06-01.Google ScholarGoogle Scholar
  11. National Vulnerabilities Database, The National Checklist Program Repository. https://nvd.nist.gov/ncp/repository?scap_Accessed: 2018-06-01.Google ScholarGoogle Scholar
  12. Open-Scap. Red Hat Incorporated. 2018. https://www.open-scap.org/download/Google ScholarGoogle Scholar
  13. NSF America's Seed Fund SBIR STTR. https://seedfund.nsf.gov/ Accessed: 2018-06-01.Google ScholarGoogle Scholar

Index Terms

  1. High Performance Computing Evaluate And Plan

                    Recommendations

                    Comments

                    Login options

                    Check if you have access through your login credentials or your institution to get full access on this article.

                    Sign in
                    • Published in

                      cover image ACM Other conferences
                      PEARC '18: Proceedings of the Practice and Experience on Advanced Research Computing
                      July 2018
                      652 pages
                      ISBN:9781450364461
                      DOI:10.1145/3219104

                      Copyright © 2018 Owner/Author

                      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

                      Publisher

                      Association for Computing Machinery

                      New York, NY, United States

                      Publication History

                      • Published: 22 July 2018

                      Check for updates

                      Qualifiers

                      • extended-abstract
                      • Research
                      • Refereed limited

                      Acceptance Rates

                      PEARC '18 Paper Acceptance Rate79of123submissions,64%Overall Acceptance Rate133of202submissions,66%
                    • Article Metrics

                      • Downloads (Last 12 months)2
                      • Downloads (Last 6 weeks)1

                      Other Metrics

                    PDF Format

                    View or Download as a PDF file.

                    PDF

                    eReader

                    View online with eReader.

                    eReader