/tag/security

  • Ivy Secure Environment

    Ivy is a secure computing environment for researchers consisting of virtual machines (Linux and Windows). Researchers can use Ivy to process and store sensitive data with the confidence that the environment is secure and meets HIPAA, FERPA, CUI or ITAR requirements.
    Facilities Statement - Are you submitting a grant proposal and need standard information about UVA research computing environments? Get it here. Overview Ivy consists of both virtual computing environments and secure storage. In order to obtain access to either system, users must
    Submit an account request, Complete the Information Security Awareness Training, and Ensure their personal computer meets all High Security VPN requirements.

  • ACCORD Security

    Back to Overview
    ACCORD is appropriate for de-identified PII, FERPA, de-identified HIPAA, business confidential, and other types of de-identified sensitive data. ACCORD cannot be used to process highly-restricted data such as CUI, FISMA, iTAR, and PCI data.
    Authentication ACCORD does not have its own user identity store but instead relies upon authentication via your home institution’s single sign-on tool.
    Authorization All members of a project have equal access to the data storage for that project, without sudo or root privileges.
    Closed Environments ACCORD environments have no outbound connectivity to the Internet other than approved library and tool
    repositories (PyPi, CPAN, CRAN, etc.

  • ACCORD Community Meeting - August 5, 2022

    When: Aug 5, 2022 11:00AM-3:00PM, Eastern Time (US and Canada)
    UVA is proud to sponsor a community meeting to discuss ACCORD, how far we have come and where we are headed. The event is all virtual, and you may attend any or all of the topics.
    Access the Event: Register for the Event Zoom Link You are welcome to invite colleagues to attend the Community Meeting, especially researchers who are new to ACCORD.
    Agenda 11:00 – 11:10 Welcome to ACCORD 11:10 – 12:00 Technical Overview of ACCORD 12:00 – 12:15 Break 12:15 – 12:45 Demo of ACCORD 12:45 – 1:30 Brown bag lunch with users sharing their experience 1:30 – 1:50 Breakout Room Topic Discussions Session 1 1:50 – 1:55 Switch Breakout Rooms 1:55 – 2:15 Breakout Room Topic Discussions Session 2 2:15 – 2:30 Break 2:30 – 3:00 Peek into the Future of ACCORD The same topics will be covered in the two breakout sessions so that you may attend two of the topics.

  • UVA Anywhere VPN on Linux

    ITS does not support the UVA Anywhere VPN client on Linux. These instructions may work but they are provided for user information only. UVA RC does not support usage of the VPN on any platform.
    Setting up the VPN Install Software Prerequisites
    You must install some software using yum,dnf, or apt-get. Note the slight difference in naming convention between distributions.
    Centos/RedHat/Fedora
    These distributions need the following packages:
    openssl openconnect NetworkManager-openconnect NetworkManager-openconnect-gnome Ubuntu
    The packages are the same but the names are different. Ubuntu 18.04 and up requires an additional package.
    openssl openconnect network-manager-openconnect network-manager-gnome network-manager-openconnect-gnome It will be necessary for Network Manager to be able to manage the connection.

  • Research Data Storage

    $(document).ready(function() { $("#status-message").hide(); updateStatusMessages(); setInterval(checkStatusMessages, 6000); }); function updateStatusMessages() { $.getJSON(‘https://tja4lfp3da.execute-api.us-east-1.amazonaws.com/api/messages' , function(data) { var messageData = ‘'; $.each(data, function(key, value) { var converter = Markdown.getSanitizingConverter(); var messageBody = value.body.replace("<br>", "
    “); var messageLength = messageBody.length; if ( messageLength There are a variety of options for storing large-scale research data at UVA. Public and internal use data storage systems can be accessed from the Rivanna high performance computing system. Sensitive and highly sensitive data can be stored and accessed within the Ivy secure computing environment. Information Security at UVA provides an overview of the data sensitivity classifications.