Skip to content

Commit

Permalink
Update toms.md
Browse files Browse the repository at this point in the history
  • Loading branch information
ahti87 authored Aug 15, 2024
1 parent b0b5855 commit a0dbab4
Showing 1 changed file with 105 additions and 3 deletions.
108 changes: 105 additions & 3 deletions docs/toms.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,107 @@
# Technical and Organizational Measures
## Technical and Organizational Measures of Puhuri Core and Puhuri Portal

The following document describes the Technical and Organizational Measures of Puhuri Core and Puhuri Portal.
1. **Overview**

![Technical and Organizational Measures](assets/Puhuri Technical and Organizational Measures of Puhuri Core and Puhuri Portal.pdf){ type=application/pdf }
The University of Tartu is hosting the Puhuri Core and Puhuri Portal instances, the functions of which are described in the Service Description.
This document describes technical and organisational measures to ensure information security and protect Personal Data in the High-Performance Computing Center (hereinafter: UTHPC) of the University of Tartu (hereinafter: University).

**Security standards**
In providing the service, the UTHPC will comply with the requirements of the [E-ITS](https://eits.ria.ee/).

2. **Introduction and scope**
1. UTHPC technical and organisational measures are based on the requirements and rules established by the University and the obligations arising from the Contract.
2. The basis for ensuring information security at UTHPC is the continuous assessment and implementation of information security measures and the training of UTHPC employees.
3. All UTHPC employees must familiarise themselves and follow UTHPC technical and organisational measures.
4. Technical and organisational measures apply to all data and information assets belonging to UTHPC that UTHPC uses to achieve its objectives or that are connected to networks managed by UTHPC.

4. **Principles**
1. UTHPC, as the owner of the information assets, selects adequate and appropriate measures to protect them.
2. Data and information assets shall be protected following the policies and laws of the UTHPC and the University, particularly those relating to data protection, human rights and freedom of information.
3. Each information asset must have a designated lead user responsible for implementing appropriate security measures to protect the information asset.
4. Non-public information shall be made available only to those with a legitimate right to access that information.
5. Everyone granted access to information assets and data shall be responsible for their proper handling following confidentiality.
6. Data and information assets must be protected from unauthorised access.
7. Information assets are only available to those with the right to use them.
8. UTHPC will provide necessary security training for its employees.

5. **Obligation of confidentiality**
1. The confidentiality requirement applies to confidential information and UTHPC employees due to legislation and agreements.
2. Information that is accessed by contract or law or that has been declared non-public on any other basis is considered confidential.
3. All UTHPC employees who come into contact with confidential data shall, as a minimum:
1. not disclose confidential information which has become known to him or her unless it is required by law or necessary for the performance of his or her duties;
2. comply with applicable data protection legislation and procedures;
3. comply with the requirements of the obligation of confidentiality both during and after the employment relationship.
4. If a third party performs the contractual obligation:
1. there must be a contract between the University and a third party, which parties sign before the contractor is granted access to the information assets;
2. The contract must contain provisions on confidentiality requirements.
5. Confidential data is processed on the UTHPC servers, and data transportation on data carriers is prohibited.

6. **Access Control**
1. Access rights are determined based on the minimum principle, which means that access is granted only to information assets to which access is necessary for the performance of work or use of the Services.
2. Granting, modifying and removing UTHPC employees' access rights is governed by the UTHPC Access Rights Rules.
3. The access rights of UTHPC employees shall be audited regularly, at least once a year, and the audit result shall be recorded.
4. When UTHPC employees' work responsibilities change, the access rights of the respective employees are reviewed, and the rights that are not necessary for the performance of the new job responsibilities are removed.
5. Upon termination of employment of a UTHPC employee, all rights of the respective employee will be removed, and the account will be closed immediately.
6. Administrative access to UTHPC resources is restricted to UTHPC employees.
7. Separated network and firewall rules and strong access credentials protect unauthorised access.
8. All UTHPC resource users have user roles that restrict their access to data related to their projects.
9. UTHPC resource user representatives have access, read and necessary modification permissions to their resources to make necessary changes to resources.
10. UTHPC resource user representative's access is limited via the firewall.
11. UTHPC internal and external support teams have read access to the resources they provide support.

7. **System operations**
1. UTHPC shall ensure that the service platform and components are updated.
2. Operating systems and applications are actively maintained. Unnecessary services are disabled or put behind the firewall.
3. UTHPC uses audit software to electronically monitor its networks, servers, routers, firewalls, and/or other UTHPC systems.
4. When making changes to hardware or software, the requirements established by the University and the rules established by UTHPC are followed.

8. **Physical security**
1. The University hosts all UTHPC network devices and servers in a closed Data centre.
2. Only authorised necessary UTHPC personnel with a special permit have physical access to the data centre.
3. The data centre is behind two locked fireproof doors that can only be opened with a personal smart card.
4. The data centre is under electronic surveillance, and when entering the Data centre, the security must be deactivated using a personal code.
5. Data centre electronic surveillance can only be deactivated if someone is physically in the server room.
6. All Data centre entries and electronic security deactivations/activations are logged.
7. To ensure fire safety, the university must follow the fire safety rules.
9. **Availability and integrity**
1. Maintenance of security measures, periodic reviews of regulations, daily monitoring of the working environment, periodic compliance checks of information security, response to changes and handling of information security incidents are necessary to ensure the continued appropriateness of security measures.
2. Continuity and disaster recovery processes are documented and reviewed yearly.

10. **Security incidents**
1. Security incidents are managed following the University's information security policy and the UTHPC security incident procedures.
2. Security incidents must be handled to minimise the damage that may occur during the incidents.
3. The information collected while resolving an incident will be documented and analysed to prevent similar incidents from occurring in the future and to decide on the need for additional security measures.
4. If signs of a criminal offence, misdemeanour or disciplinary offence or breach of an employment contract are discovered while resolving a security incident, the case shall be processed to an institution or person entitled to conduct the respective proceedings.
5. The security incident handling process and the selection of security measures shall be reviewed annually and/or after each incident identified as having failed or deficiencies in preventing and handling security incidents.

11. **Emergency**
1. An emergency is an incident that goes far beyond UTHPC jurisdiction \- particularly fire, flood, bomb threat, long-term disruption of core services, or any other significant damage that UTHPC alone cannot be expected to repair.
2. The University's fire safety rules, evacuation plans, and other rules governing emergencies will apply in an emergency.
3. Recovery from significant physical damage (fire, flood, burglary, etc.) is based on the relevant University guidelines.
4. If necessary and possible, UTHPC will provide assistance in resolving the emergency.
5. After an emergency, the UTHPC manager organises the restoration of UTHPC working conditions in cooperation with the head of the Institute of Computer Science, ITO (Information Technology Department of Univeristy ) and other University units.
6. When recovering from an emergency, services will be restored in order of priority.
7. UTHPC users are temporarily directed to use the resources of UTHPC partners, if possible and necessary.
8. If it is not possible to use the UTHPC office premises for work, the work will be continued remotely.

12. **Back-up**
1. Back-up ensures that data is preserved during data loss due to failure or human error.
2. The UTHPC manager is responsible for organising and operating the backups for UTHPC resources.
3. The backup type is incremental, which means only changed information is backed up.
4. A tape robot is used for backup, physically located in another location.
5. The backup system is located in another Data centre, the backup tapes are not physically removed from the tape robot, except in special cases (eg. data transport, etc,).
6. The tape robot database marks the backup data (backup time, files to be backed up, etc.).
7. If the data volume of the backup system increases to 80% of the maximum volume, an expansion or replacement of the backup system will be arranged.
8. Systems are in an automatic backup process and are backed up every night.
9. System logs are backed up along with the backup of the log servers.
10. Back-ups are kept under the time limits laid down in the contracts.
11. Discarded backup data will be deleted, and the media will be reused.
12. A dedicated service provider physically destroys discarded tapes.
13. Until destruction, the tapes are kept in the tape robot’s room.
14. The data on the tapes will be erased before destruction.
15. The operation of the backup system is constantly checked.
16. The backup system is monitored internally and by a system independent of the backup server.

13. **Personnel**
1. UTHPC will ensure sufficient employees to ensure that services are running and available in the event of planned and unplanned absences.

0 comments on commit a0dbab4

Please sign in to comment.