ChaptersCircleEventsBlog
Share how your organization adapts IAM practices to AI. Take the AI Identify Risk & Readiness Survey today!

Download Publication

Strengthening Research Integrity with High-Performance Computing (HPC) Security
Strengthening Research Integrity with High-Performance Computing (HPC) Security
Who it's for:
  • Cybersecurity professionals
  • HPC system admins and developers
  • Network and storage admins
  • Researchers who use HPC systems

Strengthening Research Integrity with High-Performance Computing (HPC) Security

Release Date: 08/07/2024

Updated On: 07/16/2025

High-Performance Computing (HPC) systems aggregate computing resources to gain performance greater than that of a single workstation. HPC systems have become an essential tool for researchers spanning a diverse range of fields. These sophisticated computing platforms provide the high speeds and computational muscle necessary to tackle complex problems that would be impossible using conventional computing architectures. However, as the demand for ever-increasing performance grows, HPC systems face a critical challenge: balancing speed with security.

HPC systems' complex infrastructure, extensive use of remote access, and storage of sensitive data lead to key security challenges. These challenges make them prime targets for cyber attacks. Consequences can include the loss of research findings, data corruption, disrupted research workflows, and potential legal repercussions. Fortunately, organizations can safeguard HPC systems and ensure the continued integrity of their research by adopting proactive security measures.

This publication from the CSA High Performance Computing Working Group describes how to secure HPC systems. It demonstrates that HPC environments can achieve security, while still promoting the goals of HPC researchers. By investing in innovative solutions, HPC organizations can ensure these systems are secure and continue to drive scientific progress.

Key Takeaways:
  • HPC security challenges
  • Overview of HPC architecture
  • HPC security controls, including error handling, update mechanisms, Zero Trust, network security, logging, vulnerability management, and more
Download this Resource

Bookmark
Share
Related resources
Zero Trust Automation & Orchestration and Visibility & Analytics Overview
Zero Trust Automation & Orchestration and Visib...
Zero Trust Guidance for IoT
Zero Trust Guidance for IoT
State of SaaS Security Report 2025
State of SaaS Security Report 2025
Reflections from Gartner IAM London: Visibility Leads to Observability
Reflections from Gartner IAM London: Visibility Leads to Observability
Published: 07/22/2025
What is SOC 1? — A Complete Guide to SOC 1 Reports
What is SOC 1? — A Complete Guide to SOC 1 Reports
Published: 07/18/2025
7 Email Security Metrics That Matter: How to Measure and Improve Your Protection
7 Email Security Metrics That Matter: How to Measure and Improve Yo...
Published: 07/15/2025
How Your Zero Trust Environment Affects Your Compliance Assessment
How Your Zero Trust Environment Affects Your Compliance Assessment
Published: 07/10/2025

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Michael Roza is a seasoned risk, audit, control and compliance, and cybersecurity professional with over 20 years of experience across multinational enterprises and startups. As a Cloud Security Alliance (CSA) Research member for over 10 years, he has led and contributed to more than 140 CSA projects spanning Zero Trust, AI, IoT, Top Threats, DecSecOps, Cloud Key Management, Cloud Control Matrix, and many others.

He has co-chaired...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training