Revised Computer Security Rules

[This article was updated on 3 February 2025]


At its second meeting, the Computer Security Board formally approved several Subsidiary Rules to the Use of CERN computing facilities (Operational Circular No. 5, OC5) related to Identities, Authentication & Authorisation (IAA). The approved rules (IAA2/3/4/6/7) are now documented on the website of CERN's Computing Rules.

At its third meeting, the Computer Security Board formally approved several Subsidiary Rules to OC5 related to Endpoints (EPT) and Software Restrictions (SWR). The approved rules (EPT1/2/4/5/6 and SWR2/3) are now documented on the website of CERN's Computing Rules.

At its fourth meeting, the Computer Security Board formally approved several Subsidiary Rules to OC5 related to Identities, Authentication and Authorisation (IAA5), IT Service Operations (OPS3) and Networking (NET3/4/8/9). All the approved rules are documented on the website of CERN's Computing Rules.

/Public Release. This material from the originating organization/author(s) might be of the point-in-time nature, and edited for clarity, style and length. Mirage.News does not take institutional positions or sides, and all views, positions, and conclusions expressed herein are solely those of the author(s).View in full here.