Security in Windows HPC Server 2008
Applies To: Windows HPC Server 2008
This document helps you to understand the security implications of configuration choices that you can make in Windows® HPC Server 2008. It also describes how to perform specific tasks that directly affect security in an HPC cluster, such as the task of designating HPC cluster administrators and HPC cluster users.
In this document
This document covers the following aspects of security for clusters running Windows HPC Server 2008:
Checklist of Security Settings That Can Be Tightened in an HPC Cluster: Provides a list of the main security settings for Windows HPC Server 2008 that are described in this document and describes how to tighten them.
Security Considerations for Network Topologies in Windows HPC Server 2008: Describes the security implications of network design decisions such as whether to isolate your compute nodes on a separate network or networks.
Security Considerations for Deploying Compute Nodes in Windows HPC Server 2008: Describes the security implications of using the Pre-Boot Execution Environment (PXE) for compute node deployment. This section also describes a security-related setting that you can configure in compute node templates.
Security Considerations for Designating HPC Cluster Users and Administrators: Describes the two cluster roles that you can specify in HPC Cluster Manager: HPC cluster user and HPC cluster administrator.
Security Considerations for Handling Cluster Credentials in Windows HPC Server 2008: Describes how credentials (user names and passwords) are handled during installation, configuration, and job submission in an HPC cluster. This section also describes how you can control the length of time that job-submission credentials are stored on the head node.
Configuring Firewall Exceptions and Access for Client Applications in an HPC Cluster: Describes how firewall exceptions and access settings affect the ability of client applications to run in an HPC cluster.
Not covered in this document
This document does not describe security basics, that is, strategies and risk-management methods that provide a foundation for security across your organization. Some examples of security basics are restricting physical access to your servers and networks, and using strong passwords. This document also does not describe methods for applying software updates (which can help strengthen the security of a server) to nodes in your HPC cluster. For more information about these topics, see "Additional references," later in this topic.