CCS security policy

CCS security policy

Users of the CCS supercomputer systems should follow the following security policies;

  • A private key for the SSH public-key authentication to log in to the supercomputer systems should be securely stored and managed at a location where the corresponding user can only access.

  • The private key should be protected by a passphrase.

  • The private key should not be stored at the supercomputer systems.

Even when a multi-stage SSH login is required, the above policies should be followed by using a SSH agent forwarding.  When there are several private keys to log in to the supercomputer systems, the above policies should be applied to all private keys.