01/16/2025 | News release | Distributed by Public on 01/16/2025 04:49
At its second meeting, the Computer Security Board has formally approved several Subsidiary Rules to the Use of CERN computing facilities (Operational Circular No. 5, OC5) related to Identities, Authentication & Authorization (IAA). The approved rules (IAA2/3/4/6/7) are now documented on the website of CERN's Computing Rules (https://cern.ch/ComputingRules).
At its third meeting, the Computer Security Board has formally approved several Subsidiary Rules to OC5 related to Endpoints (EPT) and Software Restrictions (SWR). The approved rules (EPT1/2/4/5/6 and SWR2/3) are now documented on the website of CERN's Computing Rules (https://cern.ch/ComputingRules).
For more information, read this article: Computer Security: Security Rules revised