Encrypt and decrypt data on UITS supercomputers

When you are working with sensitive data on IU supercomputers, you can reduce the risk of exposure greatly by keeping it encrypted except when it is needed for processing.  There will be some overhead, but the satisfaction that even a complete system breach won’t expose data makes it well worthwhile.

Prerequisites

  1. Secure your own environment.

Directions

  1. Visit this KB page, which describes the preferred method for encrypting and decrypting files on IU supercomputers.
  2. (Alternatively) Visit our Cookbook Recipe on Encryption-based workflows on IU supercomputers.

Additional Resources

Approvals

UITS supercomputers are approved for PHI,  but subject to "Shared responsibility model for securing PHI on UITS systems".

We want your feedback

Please email securemyresearch@iu.edu to report errors/omissions and send critiques, suggestions for improvements, new use cases/recipes, or any other positive or negative feedback you might have.  It will be your contribution to the Cookbook and appreciated by all who use it.