Benefits for the Customer. The service provides access to a secure scientific research IT platform, Xxxxxxxx Xxx, for secure transfer, storage, management and analysis of strictly confidential and confidential data in research. The service covers the full research data life cycle, supporting the steps from data collection to eventual archival. The added value of the service is enabling and streamlining research using confidential data. In general, use of Xxxxxxxx Xxx makes it easier for the customer to demonstrate the regulatory compliance and the emphasis on data protection in the research project. In addition to this SLA, the Leonhard Med AUP [1] and Xxxxxxxx Med Security Concept [8] documents are designed to be suitable also for these purposes.
3.1. Overview/Supported business processes
A. Secure tenants as complete environments for data transfer, storage, management, and analysis,
B. Expert RDM and IT solution engineering support,
C. Expert consultancy on secure services for strictly confidential and confidential data and
D. Gateway to the national secure BioMedIT network services. The business processes supported include: (i) security as service, i.e. compliance with Swiss and ETH regulations to protect the Confidentiality, Integrity and Availability of data, (ii) FAIR data and computing environment for strictly confidential and confidential data, (iii) flexible research platform that can be tailored to specific research needs and (iv) collaborative research environment for ETH internal and external users.
3.2. Added value of the specific service components
3.2.1. Secure tenants Secure tenants provide complete environments for data transfer, storage, management, and analysis: • Tenants are isolated from each other based on different virtualisation approaches (network and virtual machine/container hosting solutions). The tenants can be fully isolated (“secure isolated tenants”) or provide limited sharing of computing resources (“shared tenants”). See Section Leonhard Med tenant types and security levels 4.3 for the details of the differences in the implementation approaches and their security models. • Storage (capacity in order of Petabytes, option for data encryption at user level) and encrypted backup. • Encrypted data transfer (e.g. via a Secure File Transfer Service [9]) into and out of Leonhard Med at user level or as service. • User access with 2-factor authentication (via web-based remote desktop and/or or through Secure Shell/SSH-based terminal) restricted to authorized...
Benefits for the Customer. 2.1. Supported business processes
Benefits for the Customer