CERN - European Organization for Nuclear Research

01/16/2025 | News release | Distributed by Public on 01/16/2025 04:49

Revised Subsidiary Rules

At its second meeting, the Computer Security Board has formally approved several Subsidiary Rules to the Use of CERN computing facilities (Operational Circular No. 5, OC5) related to Identities, Authentication & Authorization (IAA). The approved rules (IAA2/3/4/6/7) are now documented on the website of CERN's Computing Rules (https://cern.ch/ComputingRules).

At its third meeting, the Computer Security Board has formally approved several Subsidiary Rules to OC5 related to Endpoints (EPT) and Software Restrictions (SWR). The approved rules (EPT1/2/4/5/6 and SWR2/3) are now documented on the website of CERN's Computing Rules (https://cern.ch/ComputingRules).

For more information, read this article: Computer Security: Security Rules revised

CERN - European Organization for Nuclear Research published this content on January 16, 2025, and is solely responsible for the information contained herein. Distributed via Public Technologies (PUBT), unedited and unaltered, on January 16, 2025 at 10:49 UTC. If you believe the information included in the content is inaccurate or outdated and requires editing or removal, please contact us at [email protected]