Security at CISM

We follow the principle guidelines described in the following document in your design and day-to-day operation of the CISM infrastructure.

Audit and supervision

We are in the process of auditing the whole infrastructure and procedures with the Security team of the university (USSI).

UCLouvain members have access to the USSI summary report.

Privileges

Users never have priviledge access to the machines (sudo or root) access. This is important to make sure the system stays available fairly for every user, and does not prevent users from working effectively. It does somethimes, however, require users to adapt some aspects of their work, most notably stop copy/pasting software installation instructions from random websites and actually understand how to compile and optimize software on the clusters. Alternatively, they can ask the software to be installed for them.