Information Security policies.
Adding a new policy can be done using a dedicated form: Create from template
Title | Policy status | Approval status | Approved version and date | Statement |
---|---|---|---|---|
Grid Policy on the Handling of User-Level Job Accounting | FINALISED | APPROVED | v2.0 | This document presents the minimum requirements and policy framework for the handling of user-level accounting data created, stored, transmitted, processed and analysed as a result of the execution of jobs on the Grid. |
Security Policy Glossary of Terms | FINALISED | APPROVED | v1.0 | This document provides a common reference for the meaning of various terms used in the context of the EGI Security Policy Group documents. As well as defining terms, this glossary also limits the scope of meaning of terms used in the security policy documents. |
Security Policy for the Endorsement and Operation of Virtual Machine Images | FINALISED | APPROVED | v4 | This document describes the security-related policy requirements for the generation, distribution and operations of virtual machine (VM) images, as part of a trusted computing environment of the IT infrastructure. The aim is to enable VM images to be generated according to best practices and to be both trusted and operated elsewhere. |
Policy on e-infrastructure Multi-User Pilot Jobs | FINALISED | APPROVED | v2 | Security policy for operation of multi-user pilot jobs. |
VO Portal Policy | FINALISED | APPROVED | v2 | This security policy applies to all Portals operated by Virtual Organisations that participate in the e-Infrastructure. It defines the conditions that apply to each of four different portal classes. |
Community Membership Management Policy | FINALISED | APPROVED | v1 | This policy is designed to establish trust between a Community and other Communities, Infrastructures, and the R&E federations. |
Community Operations Security Policy | FINALISED | APPROVED | v1 | The purpose of this policy is to ensure that the Community’s use of the Infrastructure is appropriate, and that the Infrastructure and Communities will respond together to accidental or malicious use that is excessive, harmful to others, or not for appropriate purposes. |
Acceptable Use Policy and Conditions of Use | FINALISED | APPROVED | v3 | The conditions of use described in the AUP have to be accepted by all Users during their registration as a user of the Infrastructure. |
Policy on the Processing of Personal Data | FINALISED | APPROVED | v2 | This policy ensures that data collected as a result of the use of the Infrastructure is processed fairly and lawfully by Infrastructure participants. |
Security Incident Response Policy | FINALISED | APPROVED | v2 | Policy on handling security incidents. |
Policy on Acceptable Authentication Assurance | FINALISED | APPROVED | v1 | This policy defines the approved authentication assurance sources. |
Security Traceability and Logging Policy | FINALISED | APPROVED | v2 | Security policy requirements for traceability and logging. |
Service Operations Security Policy | FINALISED | APPROVED | v4 | This security policy presents the conditions that apply to anyone running a Service on the Infrastructure, or to anyone providing a Service that is part of the Infrastructure. |
e-infrastructure Security Policy | FINALISED | APPROVED | v2 | Policy regulating those activities of e-Infrastructure participants related to the security of e-Infrastructure services and resources. |