When you are working with sensitive data on UITS supercomputers, you can reduce the risk of exposure greatly by keeping it encrypted except when it is needed for processing.  There will be some overhead, but the satisfaction that even a complete system breach won’t expose data makes it well worthwhile.

Prerequisites

Directions

Additional Resources

Approvals

UITS supercomputers are approved for PHI,  but subject to "Shared responsibility model for securing PHI on UITS systems".

We want your feedback

Please email securemyresearch@iu.edu to report errors/omissions and send critiques, suggestions for improvements, new use cases/recipes, or any other positive or negative feedback you might have.  It will be your contribution to the Cookbook and appreciated by all who use it.