CPU 24/7 HPC clusters are characterized by the following key security features:
Data Centre Security
The HPC clusters are located at an ISO 27001 certified, verifiable, high-security computing centre in Berlin, Germany. The equipment in the data centre conforms to the Level TIER 4 and includes redundant infrastructures, access controls, authorisation concepts and video monitoring.
Each CPU 24/7 customer is provided with a non-virtualised, customised simulation environment with access to exclusively dedicated and private bare-metal servers. A CPU 24/7 solution is not based on a shared IT infrastructure and consequently its use is confined to the specific client.
Customers and their data are isolated by completely separate systems. In technical terms the connection and operation are equivalent to adding an additional business location. For communication, secure industry standard and authenticated connections and protocols with basic encryption (e.g. SCP, SSH or SFTP) are used.
Application and Platform Security
CPU 24/7 carries out a well-integrated, effective patch and change management, to avoid operating faults and minimise security vulnerabilities, which can be quickly resolved. CPU 24/7 ensures that patches are compatible on test systems before adopting them in production.
Data is stored solely in German high security data centres and is handled in accordance with the Federal Data Protection Act and the Federal Office for Information Security (BSI). Data deletion is executed according to common data deletion standards. Data media which are not in use any more will be destroyed by appropriate means.
Additional Individual Agreements
On request, CPU 24/7 sets up individual, enterpriseclass security and availability agreements as well as wide-ranging confidentiality agreements, service level agreements or a system security policy to cope 100% with the customer’s security and availability requirements.
Secure Shell (SSH)
Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. SSH provides a secure channel over an unsecured network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. SSH is typically used to log into a remote machine and execute commands, and it can transfer files using the associated SSH file transfer (SFTP) or secure copy (SCP) protocols.
A stationary simulation is a calculation that does not take temporal changes of events but the final state of an object into account. This term is usually used for simulations of temperature and magnetic fields. The energy of one component only consists of potential energy. In structural mechanics for example we speak of stationary events when there is no temporally change in a vibration.