Life Sciences

Architecting for genomic security and compliance

Issue link: https://read.uberflip.com/i/1182528

Contents of this Issue

Navigation

Page 1 of 16

Amazon Web Services – Architecting for Genomic Data Security and Compliance in AWS December 2014 Page 2 of 17 Table of Contents Overview .................................................................................................................................... 3 Scope ........................................................................................................................................ 3 Considerations for Genomic Data Privacy and Security in Human Research ............................. 3 AWS Approach to Shared Security Responsibilities ................................................................... 4 Architecting for Compliance with dbGaP Security Best Practices in AWS .................................. 5 Deployment Model.................................................................................................................. 6 Data Location ......................................................................................................................... 6 Physical Server Access .......................................................................................................... 7 Portable Storage Media .......................................................................................................... 7 User Accounts, Passwords, and Access Control Lists ............................................................ 8 Internet, Networking, and Data Transfers ............................................................................... 9 Data Encryption .....................................................................................................................11 File Systems and Storage Volumes .......................................................................................13 Operating Systems and Applications .....................................................................................14 Auditing, Logging, and Monitoring .........................................................................................15 Authorizing Access to Data ....................................................................................................16 Cleaning Up Data and Retaining Results ...............................................................................17 Conclusion ................................................................................................................................17

Articles in this issue

view archives of Life Sciences - Architecting for genomic security and compliance