| 39 | |
| 40 | === External Network Access |
| 41 | Only authenticated users can log in to the Consoles and and other SSH jump hosts. We assume that the user connecting with a given SSH key is the same user that uploaded it to the portal. |
| 42 | |
| 43 | **Important** The user takes all responsibility for safeguarding their local SSH keys. Best practices, such as strong passphrases should be followed. |
| 44 | |
| 45 | Our SSH endpoints are configured following [https://infosec.mozilla.org/guidelines/openssh the Mozilla best practices guidelines]. |
| 46 | |
| 47 | VPN access is similarly gated on the testbed access credentials. SSH and VPN connections may only be initiated during a reservation, and are closed automatically at the end of said reservation. |
| 48 | |
| 49 | All externally facing machines are behind a firewall, as well as having their own security mechanisms configured. |
| 50 | |
| 51 | To access their own files, or the testbed resources, a user has to connect through one of the configure Jump Hosts. All Jump Hosts log user access to a central location. |
| 52 | |
| 53 | === Internal Network Access |
| 54 | External Access, Experiment Control, and Experiment Dataplane networks are isolated with VLANs and ACLs on the core network switches. |
| 55 | |
| 56 | To connect to Domain Resources, a User must pass through the Domain's Console. |
| 57 | |
| 58 | === Shared Machines |
| 59 | User data is safeguarded by standard POSIX permissions. Safe defaults have been set, but it is the users' responsibility to avoid running untrusted code, or setting their own files to world writable. |
| 60 | |
| 61 | Shared machines are treated as if public, from a security perspective. It is assumed that all connections, both from external networks, and from experiment networks, are untrusted by default. |
| 62 | |
| 63 | Cron jobs or other long running commands are permitted after the end of a reservation, as the management process will kill all processes spawned by said user. |
| 64 | |
| 65 | === Testbed Compute resources |
| 66 | |
| 67 | Within a Domain, and during their Reservation, users have full rights to the Compute Resources, and have both root and serial console access. |
| 68 | |
| 69 | These machines are insecure by default, except for these factors: |
| 70 | |
| 71 | * No network access from outside. A combination of a stateful firewall and NAT prevents external entities from initiating connections. This is the standard assumption for say, a properly configure Home LAN. |
| 72 | * No access between experiment networks, unless configured. Users are able to manually bridge networks, during their reservation, if they have the relevant rights. Users must act according to their own security model. |
| 73 | |
| 74 | When a compute resource is provisioned, the disk is overwritten. At the same time, if sensitive information is saved to disk, it is the experimenter's responsibility to erase the disk with our provided commands. |
| 75 | |
| 76 | |