<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://helpdesk.strw.leidenuniv.nl/wiki/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://helpdesk.strw.leidenuniv.nl/wiki/feed.php">
        <title>Computer Documentation Wiki - policies:security</title>
        <description></description>
        <link>https://helpdesk.strw.leidenuniv.nl/wiki/</link>
        <image rdf:resource="https://helpdesk.strw.leidenuniv.nl/wiki/lib/exe/fetch.php?media=wiki:logo.png" />
       <dc:date>2026-04-04T03:05:59+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:access&amp;rev=1515753776&amp;do=diff"/>
                <rdf:li rdf:resource="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:assets&amp;rev=1515598400&amp;do=diff"/>
                <rdf:li rdf:resource="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:astro_soft&amp;rev=1515423741&amp;do=diff"/>
                <rdf:li rdf:resource="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:audit&amp;rev=1515586750&amp;do=diff"/>
                <rdf:li rdf:resource="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:calculations&amp;rev=1516034579&amp;do=diff"/>
                <rdf:li rdf:resource="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:classification&amp;rev=1632122917&amp;do=diff"/>
                <rdf:li rdf:resource="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:classificationguidelines&amp;rev=1515154225&amp;do=diff"/>
                <rdf:li rdf:resource="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:data&amp;rev=1516034727&amp;do=diff"/>
                <rdf:li rdf:resource="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:develandmaint&amp;rev=1515591168&amp;do=diff"/>
                <rdf:li rdf:resource="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:homedir&amp;rev=1605970070&amp;do=diff"/>
                <rdf:li rdf:resource="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:mail&amp;rev=1516033092&amp;do=diff"/>
                <rdf:li rdf:resource="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:organization&amp;rev=1515154425&amp;do=diff"/>
                <rdf:li rdf:resource="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:pc&amp;rev=1515424106&amp;do=diff"/>
                <rdf:li rdf:resource="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:remoteaccess&amp;rev=1516034431&amp;do=diff"/>
                <rdf:li rdf:resource="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:sysman&amp;rev=1515584841&amp;do=diff"/>
                <rdf:li rdf:resource="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:web&amp;rev=1516034291&amp;do=diff"/>
                <rdf:li rdf:resource="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:whodoeswhat&amp;rev=1515157957&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://helpdesk.strw.leidenuniv.nl/wiki/lib/exe/fetch.php?media=wiki:logo.png">
        <title>Computer Documentation Wiki</title>
        <link>https://helpdesk.strw.leidenuniv.nl/wiki/</link>
        <url>https://helpdesk.strw.leidenuniv.nl/wiki/lib/exe/fetch.php?media=wiki:logo.png</url>
    </image>
    <item rdf:about="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:access&amp;rev=1515753776&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-01-12T10:42:56+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>access</title>
        <link>https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:access&amp;rev=1515753776&amp;do=diff</link>
        <description>Baseline Security

Access control

20. User management

New users are either students or institute members. Their enrolment in the courses or their appointment as member of the institute is regulated elsewhere. Once this has taken place, personal information of these persons are entered into the Person database by the institute secretariat. Once this is done system management can use a WEB forms system to generate an account.</description>
    </item>
    <item rdf:about="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:assets&amp;rev=1515598400&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-01-10T15:33:20+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>assets</title>
        <link>https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:assets&amp;rev=1515598400&amp;do=diff</link>
        <description>Registration of assets

Information repositories

	*  RMSdb: Relational management Database
	*  Helpdesk Wiki: User computer information store

Software

	*  Jobs Application System
	*  Conference Management System
	*  Local WEB server
	*  Helpdesk
	*  Astronomical Software
	*  PC Software

Hardware

	*  CMDB: Computer management database

Services

	*  Poster printing
	*  Toner warehouse
	*  Hardware Acquisition
	*  Software development</description>
    </item>
    <item rdf:about="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:astro_soft&amp;rev=1515423741&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-01-08T15:02:21+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>astro_soft</title>
        <link>https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:astro_soft&amp;rev=1515423741&amp;do=diff</link>
        <description>LINUX BASED WORKSTATIONS

Large Packages for data reduction

	*  AIPS : (Astronomical Image Processing System)
	*  AIPS++ : (Astronomical Image Processing System --Object-Oriented)
	*  AipsView : Aipsview is a tool for visual data analysis built at NCSA with support from the  NSF/ARPA Grand Challenge project in Radio Astronomy Imaging.</description>
    </item>
    <item rdf:about="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:audit&amp;rev=1515586750&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-01-10T12:19:10+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>audit</title>
        <link>https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:audit&amp;rev=1515586750&amp;do=diff</link>
        <description>Security Baseline

Auditing

40. IT Audit

On a regular basis security checks are performed using standard web tools such as Qualys SSL Labs. In addition the yearly OS upgrade of all Desktops initiates a similar audit on the local machine base and ensures clean secure installes of all such devices.</description>
    </item>
    <item rdf:about="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:calculations&amp;rev=1516034579&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-01-15T16:42:59+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>calculations</title>
        <link>https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:calculations&amp;rev=1516034579&amp;do=diff</link>
        <description>Scientific Computing

This service is a combination of several individual services that are related in terms of usage.

Compute

	*  Desktop computing: For quick and interactive scientific processing avdn office automation we provide a desktop with high cpu, ram and storage capacity. Each year we evaluate the requirements for such equipment and initiate a min-competitie to acquire yearly a new, up to date batch. Currently the systems provide 6 cores with hyperthreading, 16G ram and approximately…</description>
    </item>
    <item rdf:about="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:classification&amp;rev=1632122917&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2021-09-20T07:28:37+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>classification</title>
        <link>https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:classification&amp;rev=1632122917&amp;do=diff</link>
        <description>Baseline Security

Classification

3. Registration of assets

A list is available that records purpose and ownership of all assets

4. Line managers

Due to the limited size of the IT Department there is no highly detailed denotion of line managers, but a</description>
    </item>
    <item rdf:about="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:classificationguidelines&amp;rev=1515154225&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-01-05T12:10:25+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>classificationguidelines</title>
        <link>https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:classificationguidelines&amp;rev=1515154225&amp;do=diff</link>
        <description>Classification guidelines

Definitions

Confidential Data is a generalized term that typically represents data classified as Restricted, according to the data classification scheme defined in this Guideline. This term is often used interchangeably with sensitive data.</description>
    </item>
    <item rdf:about="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:data&amp;rev=1516034727&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-01-15T16:45:27+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>data</title>
        <link>https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:data&amp;rev=1516034727&amp;do=diff</link>
        <description>Data

We denote several types of data in the compute environment of the scientific systems:

	*  Science generated: New information generated by lab experiments or theoretical calculations form the basis for the scientific output of the university. This unique type of data should be stored on highly save media and kept available for at least 10 years (data management requirement).</description>
    </item>
    <item rdf:about="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:develandmaint&amp;rev=1515591168&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-01-10T13:32:48+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>develandmaint</title>
        <link>https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:develandmaint&amp;rev=1515591168&amp;do=diff</link>
        <description>Security Baseline

Development and Maintenance

31. System ownership

System ownership for scientific systems is driven by the funding mechanism. Many systems are acquired though NWO and EU funding. The PI of the project is by definition the owner of the system. Both functional and technical management are in the hands of the IT Department.</description>
    </item>
    <item rdf:about="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:homedir&amp;rev=1605970070&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-11-21T14:47:50+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>homedir</title>
        <link>https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:homedir&amp;rev=1605970070&amp;do=diff</link>
        <description>Home directory

This is the place where users store their local mail folders and where they can store personal files and files that need highly secure and reliability. It is of limited size (user quota in place) as the high reliability requirement forces a backup procedure that puts a high demand on the storage media.</description>
    </item>
    <item rdf:about="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:mail&amp;rev=1516033092&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-01-15T16:18:12+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>mail</title>
        <link>https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:mail&amp;rev=1516033092&amp;do=diff</link>
        <description>Mail

Everything associated with mail has High rating as we are dealing with private and restricted data. So no one else then the owner of the mail should have access. Therefore, mail is secured through the user authentication and authorization measures of the</description>
    </item>
    <item rdf:about="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:organization&amp;rev=1515154425&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-01-05T12:13:45+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>organization</title>
        <link>https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:organization&amp;rev=1515154425&amp;do=diff</link>
        <description>Security Baseline

Organization

1. Roles

	*  Information security manager: This is in the hands of the Scientific Director(s). Currently Huub Rottgering and Eric Eliel.
	*  Security Manager: This role is associated to the IT Department head. Currently Erik Deul</description>
    </item>
    <item rdf:about="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:pc&amp;rev=1515424106&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-01-08T15:08:26+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>pc</title>
        <link>https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:pc&amp;rev=1515424106&amp;do=diff</link>
        <description>PC-standard software

	*  Adobe photoshop
	*  Adobe acrobat reader
	*  Adobe Acrobat professional
	*  Adobe flash-player
	*  Cutepdf
	*  Ghostscript
	*  Ghostview
	*  Java
	*  Mcafee 
	*  Microsoft Office 2013
	*  Microsoft Office 2016
	*  Microsoft Office lang-packs</description>
    </item>
    <item rdf:about="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:remoteaccess&amp;rev=1516034431&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-01-15T16:40:31+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>remoteaccess</title>
        <link>https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:remoteaccess&amp;rev=1516034431&amp;do=diff</link>
        <description>Remote access

For the purpose of working outside the institute, access to the local systems is provided in several secure ways:

	*  Remote login: There are ssh servers tha provide login facilities to the institute front end computers. These ssh servers can be used to further login to local Linux desktops and servers or can be used to build ssh tunnels to allow remote access to local facilities, such as desktop graphical interface or license server.</description>
    </item>
    <item rdf:about="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:sysman&amp;rev=1515584841&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-01-10T11:47:21+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>sysman</title>
        <link>https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:sysman&amp;rev=1515584841&amp;do=diff</link>
        <description>Baseline Security

System management

11. System management guidelines

We have developed guidelines (as recorded in the sysadmin wiki, restricted access) for

	*  Initialize
	*  Decommissioning
	*  Backups
	*  System repairs
	*  Fault management
	*  Log management</description>
    </item>
    <item rdf:about="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:web&amp;rev=1516034291&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-01-15T16:38:11+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>web</title>
        <link>https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:web&amp;rev=1516034291&amp;do=diff</link>
        <description>Web

There are several aspects to this service:

	*  Personal webstack: Each user has an area with his home directory that maps to a personal web site denoted by appending the standard institute url with ~username. It can contain any information the user wishes to disclose to the world.</description>
    </item>
    <item rdf:about="https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:whodoeswhat&amp;rev=1515157957&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2018-01-05T13:12:37+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>whodoeswhat</title>
        <link>https://helpdesk.strw.leidenuniv.nl/wiki/doku.php?id=policies:security:whodoeswhat&amp;rev=1515157957&amp;do=diff</link>
        <description>List of responsibilities
PersonExpertiseErik Deul Linux, WEB office/sytem management tools, Scientific software, Science serversDavid Jansen Linux, Scientific software, MacOS, Science Servers, HPCAart Vos Windows, Lab science, Office automationLeonardo Lenoci</description>
    </item>
</rdf:RDF>
