{"id":2148,"date":"2020-11-23T08:54:41","date_gmt":"2020-11-23T08:54:41","guid":{"rendered":"https:\/\/lexis-project.eu\/web\/?page_id=2148"},"modified":"2021-10-26T17:14:52","modified_gmt":"2021-10-26T17:14:52","slug":"security","status":"publish","type":"page","link":"https:\/\/lexis-project.eu\/web\/open-call\/security\/","title":{"rendered":"Security"},"content":{"rendered":"\n<h3>SECURITY IMPACTS &amp; REQUIREMENTS OF THE APPLICATION EXPERIMENT<\/h3>\n\n\n\n<p>The LEXIS platform is aiming at\nproviding high level security for its users and is relying on security\nassessment along the project with a final security assessment prior being made\npublicly available. As a matter of fact, this will involve security constraints\nfor all LEXIS users depending on the integration level.<\/p>\n\n\n\n<p>For instance, if the applicants wants\nto fully connect its own Data center capacity (data storage and computational\npower), this will only be possible by deploying a LEXIS DDI endpoint in his own\ninfrastructure and respecting LEXIS design principle for any part of its\ninfrastructure connected to LEXIS platform, such as:<\/p>\n\n\n\n<ul><li><strong>Zero trust model: all access must be authenticated and authorized<\/strong><\/li><li><strong>Least privileges principles: all access must be restricted to the\nmiminum required to achieve a task<\/strong><\/li><li><strong>Putting in place attack surface minimization, separation of duties and\nensuring secure default<\/strong><\/li><\/ul>\n\n\n\n<p>The LEXIS consortium may require as\nwell some compliance reports security audit assessment.<\/p>\n\n\n\n<p>For an applicant using the LEXIS\nplatform without integrating any part of its infrastructure, the security\nconstraints will be reduce to the minimum, meaning following common industry\nsecurity best practices such as:<\/p>\n\n\n\n<ul><li><strong>Using dedicated account (no shared account)<\/strong><\/li><li><strong>Ensuring the use of string password and rotating them regularily<\/strong><\/li><li><strong>etc&#8230;<\/strong><\/li><\/ul>\n\n\n\n<p>The LEXIS already made publicy\navailable D4.5 describing the security concepts put in place and may provide\nmore detailed information on-demand and under non disclosure agreement.<\/p>\n\n\n\n<p>The LEXIS platform is deployed on ISO\ncertified datacenter and will regularity audit both the component and the\noverall infrastructure aiming at having continuous monitoring in place before\nbeing publicly available. All components of the LEXIS platform will be\nregularly updated depending of the software compatibility and counter measure\nwill be put in place in case of software incompatibility.<\/p>\n\n\n\n<p>It is worth to mention, that no direct access to Data Layer or HPC resources will be provided and that we ensure secure channel communication between HPC resources and LEXIS platform.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SECURITY IMPACTS &amp; REQUIREMENTS OF THE APPLICATION EXPERIMENT The LEXIS platform is aiming at providing high level security for its users and is relying on security assessment along the project with a final security assessment prior being made publicly available. As a matter of fact, this will involve security constraints for all LEXIS users depending [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1691,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Security - LEXIS project \/ LEXIS Platform<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/lexis-project.eu\/web\/open-call\/security\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_GB\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Security - LEXIS project \/ LEXIS Platform\" \/>\r\n<meta property=\"og:description\" content=\"SECURITY IMPACTS &amp; REQUIREMENTS OF THE APPLICATION EXPERIMENT The LEXIS platform is aiming at providing high level security for its users and is relying on security assessment along the project with a final security assessment prior being made publicly available. As a matter of fact, this will involve security constraints for all LEXIS users depending [&hellip;]\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/lexis-project.eu\/web\/open-call\/security\/\" \/>\r\n<meta property=\"og:site_name\" content=\"LEXIS project \/ LEXIS Platform\" \/>\r\n<meta property=\"article:modified_time\" content=\"2021-10-26T17:14:52+00:00\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lexis-project.eu\/web\/#website\",\"url\":\"https:\/\/lexis-project.eu\/web\/\",\"name\":\"LEXIS project \/ LEXIS Platform\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/lexis-project.eu\/web\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lexis-project.eu\/web\/open-call\/security\/#webpage\",\"url\":\"https:\/\/lexis-project.eu\/web\/open-call\/security\/\",\"name\":\"Security - LEXIS project \/ LEXIS Platform\",\"isPartOf\":{\"@id\":\"https:\/\/lexis-project.eu\/web\/#website\"},\"datePublished\":\"2020-11-23T08:54:41+00:00\",\"dateModified\":\"2021-10-26T17:14:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/lexis-project.eu\/web\/open-call\/security\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lexis-project.eu\/web\/open-call\/security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/lexis-project.eu\/web\/open-call\/security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/lexis-project.eu\/web\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Introduction\",\"item\":\"https:\/\/lexis-project.eu\/web\/open-call\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security\"}]}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/lexis-project.eu\/web\/wp-json\/wp\/v2\/pages\/2148"}],"collection":[{"href":"https:\/\/lexis-project.eu\/web\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/lexis-project.eu\/web\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/lexis-project.eu\/web\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lexis-project.eu\/web\/wp-json\/wp\/v2\/comments?post=2148"}],"version-history":[{"count":5,"href":"https:\/\/lexis-project.eu\/web\/wp-json\/wp\/v2\/pages\/2148\/revisions"}],"predecessor-version":[{"id":2672,"href":"https:\/\/lexis-project.eu\/web\/wp-json\/wp\/v2\/pages\/2148\/revisions\/2672"}],"up":[{"embeddable":true,"href":"https:\/\/lexis-project.eu\/web\/wp-json\/wp\/v2\/pages\/1691"}],"wp:attachment":[{"href":"https:\/\/lexis-project.eu\/web\/wp-json\/wp\/v2\/media?parent=2148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}