Windows HPC Server 2008 R2: Security

Updated: December 2011

Applies To: Windows HPC Server 2008 R2

This document helps you to understand the security implications of configuration choices that you can make in Windows® HPC Server 2008 R2. It also describes how to perform specific tasks that directly affect security in an HPC cluster, such as the task of designating HPC cluster administrators and HPC cluster users.

In this document

Title Description

Checklist of Security Settings That Can Be Tightened with Windows HPC Server 2008 R2

Provides a list of the Mayn security settings for Windows HPC Server 2008 R2 that are described in this document and describes how to tighten them.

Security Considerations for Network Topologies in Windows HPC Server 2008 R2

Describes the security implications of network design decisions such as whether to isolate your compute nodes on a separate network or networks.

Security Considerations for SQL Server Databases used by Windows HPC Server 2008 R2

Describes the range of security options that are available for the SQL Server databases that are used by Windows HPC Server 2008 R2.

Security Considerations for Deploying Compute Nodes in Windows HPC Server 2008 R2

Describes the security implications of using the Pre-Boot Execution Environment (PXE) for compute node deployment. This section also describes a security-related setting that you can configure in compute node templates.

Security Considerations for Designating HPC Cluster Users and Administrators

Describes the two cluster roles that you can specify in HPC Cluster Manager: HPC cluster user and HPC cluster administrator.

Security Considerations for File and Folder Permissions in Windows HPC Server 2008 R2

Lists types of files and folders that have security implications in an HPC cluster, describes their locations, and describes why they are important.

Security Considerations for Handling Cluster Credentials in Windows HPC Server 2008 R2

Describes how credentials (user names and passwords) are handled during installation, configuration, and job submission in an HPC cluster. This section also describes how you can control the length of time that job-submission credentials are stored on the head node.

Configuring Firewall Exceptions and Access for Client Applications with Windows HPC Server 2008 R2

Describes how firewall exceptions and access settings affect the ability of client applications to run in an HPC cluster.

Security Considerations for Using Azure Nodes in a Windows HPC Cluster

Describes security considerations for deploying and running jobs on Windows Azure nodes that have been added to an HPC cluster (a Windows Azure “burst” scenario)

Not covered in this document

This document does not describe security basics, that is, strategies and risk-management methods that provide a foundation for security across your organization. Some examples of security basics are restricting physical access to your servers and networks, and using strong passwords. This document also does not describe methods for applying software updates (which can help strengthen the security of a server) to nodes in your HPC cluster. For more information about these topics, see "Additional references," later in this topic.

Additional references