Circle
Events
Blog

Research Topic

High Performance Computing

Latest ResearchWorking Group
Survey Report - Security Practices in HPC & HPC Cloud
Survey Report - Security Practices in HPC & HPC Cloud

Download

High Performance Computing
‘Vanilla’ cloud environments were typically not made to handle harsh environments like that of High Performance Computing (HPC) Cloud Security. With the current trend of HPC workloads and infrastructure increasingly becoming cloud-like (eg. resource pooling, rapid elasticity, on-demand self-service), or interacting with the cloud (e.g. bursting), security will become a great concern at an accelerating rate. 

Technical concerns for HPC are further complicated by the complex and ever-evolving threat landscape. As we increasingly see cases of pure HPC bare metal infrastructure interacting with the cloud such as I/O interfaces and processes, it brings along more ‘opportunities’ for malicious attacks. While this should be considered and integrated into security policies and guidelines, performance faces the perils of being compromised as precious resources are carved out for security protocols and processes. 

A key challenge is implementing security in a HPC cloud environment without compromising performance. The secure interchange of data between traditional HPC and HPC Cloud, and the portability of a user’s HPC workflow and tools are critical elements of HPC Cloud use. Where a traditional HPC environment has a dedicated team of administrators, a HPC Cloud environment may rely on the use of community-supported, generically preconfigured tools from sources like OpenHPC (http://www.openhpc.community/). 

How do we start addressing these challenges?
To start addressing these security challenges CSA conducted a survey on security in HPC. This survey report provides insight to the level and type of cyber and cloud security adopted by HPC / HPC Cloud infrastructure to protect their infrastructure and workloads, and shines a light on common challenges faced in the industry, together with the real world security processes put in place to tackle such hindrances. 


High Performance ComputingInternet of ThingsQuantum-Safe SecurityBlockchain/Distributed LedgerArtificial IntelligenceIndustrial Control Systems

Discuss this topic in Circle

Have an interesting article or video on this topic that you want to share? Anyone can join the discussion community for this topic to share ideas or ask questions.

View discussion community

Participate in High Performance Computing Research

The crossing of cloud and HPC environments often leads us to questions of how security in an HPC cloud environment can be implemented, enforced and ensured without the need to compromise performance. This working group strives to provide recommendations that can answer these questions.

View the working group

CSA Research crowd-sources the knowledge and expertise of security experts and helps address the challenges and needs they’ve experienced, or seen others experience, within the cybersecurity field. Each publication is vendor-neutral and follows the peer review process outlined in the CSA Research Lifecycle. We recommend getting started by reading the following documents.

Survey Report - Security Practices in HPC & HPC Cloud

Survey Report - Security Practices in HPC & HPC Cloud

Gain insights into the level and type of cyber and cloud security adopted by High Performance Computing (HPC) / HPC Cloud infrastructure to protect their infrastructure and workloads. This report highlights the perceived level of security, perception of security vs performance, drivers and impediments to cloud-enablement and improving security postures, and security practices that could be adopted in HPC / HPC Cloud environments.

Webinars

Security Challenges for Mobile Networks
Security Challenges for Mobile Networks

October 20 | online

Learn more

Introducing our latest AI/ML open source project: LotL Classifier
Introducing our latest AI/ML open source project: LotL Class...

February 3 | Online

Learn more

LotL Classifier
LotL Classifier

February 3 | Online

Learn more

Corda Enterprise 4.8 - Architecture Security Report and Security Controls Checklist
Corda Enterprise 4.8 - Architecture Security Report and Secu...

December 14 | Online

Learn more

Blog Posts

New 2020 Survey Report on Security Practices in HPC & HPC Cloud