Banner Image

Research Security

At the University of California, Riverside (UCR), ensuring the security of research data is a priority. We work closely with UCR’s Information Security Team to provide comprehensive consulting services on securing your research projects. Our goal is to ensure that all research activities meet the highest standards of data security, complying with relevant regulations and university policies. Understanding and adhering to records retention policies is also a critical component of responsible data management. For guidance, please refer to the UC Riverside Research Records Retention: A Quick Guide for Researchers.

We assist researchers in several key areas:

  • Understanding Your Research Security: We delve into the specifics of your research to identify any applicable regulations, requirements, and necessary controls.
  • Data Security Plan: We aid in developing a Data Security Plan for your project. The DSP outlines Roles, Responsibilities, Guidelines, Processes, and Controls essential for safeguarding your data. For full details on the DSP intake process, see our UCR Data Security Plans page.
  • Implementation: Our team is here to help implement the plans or controls developed, ensuring your research data is secure within approved environments.

We encourage researchers to connect with the Research Computing Team to explore how we can support your data security needs.

Understanding your Research Security

Understanding and adhering to security policies and regulations is critical for safeguarding research data at UCR. All research data falls under a classification of security level ranging from P1 to P4, refer to the detailed descriptions of each level on the UCOP Security Classification page: UCOP Information Security Classification Standards:

  • P1/P2 involving data without Personal Identifiable Information (PII)—P1 being public and P2 internal.
  • P3/P4 categories deal with data containing PII, necessitating a Data Security Plan, where P3 is classified as sensitive and P4 as confidential.

By default, the systems we build and manage at UCR Research Computing are designed to comply with the UC IS-3 policy at the P2 level, ensuring a robust foundation for data security and integrity. While our infrastructure supports projects up to P4 level, accommodating the highest levels of data sensitivity, it is important to note that we do not support the handling of US classified data.

Meeting Federal Compliance: NIST 800-171, CMMC, & NIH dbGaP

Many federal grant proposals now include strict requirements for data security. If your grant or DUA involves the Department of Defense (DoD), Department of Energy (DOE), NIH dbGaP, or mandates specific federal compliance frameworks like CMMC or NIST 800-171, this is handled specially.

  • Our Solution: The UCR Secure Enclave The UCR Secure Enclave is the official campus environment purpose-built to meet the technical controls required by NIST 800-171 Rev 2 and handle NIH dbGaP data. By using the UCR Secure Enclave, your lab is operating in an environment that provides the necessary technical foundation to meet CMMC Level 2 controls, enabling you to pursue DoD-funded research.

How to Proceed

Navigating these requirements is complex. If your grant proposal or DUA mentions NIST 800-171 Rev 2, CMMC Level 2, or NIH dbGaP, please contact us immediately. We will work with you and the Information Security Office to develop the required Data Security Plan (DSP).

Important: Due to the significant security and monitoring overhead, the UCR Secure Enclave is a premium Tier 2 (Direct Recharge) service and requires a grant-funded Chart of Accounts (COA).

Computing Resources and Security Classifications

Resource Type Resource Description Top Security Classification Remarks
Compute High-Performance Computing Center (HPCC) A key resource for intensive computational tasks. P3 Suitable for a broad range of research workflows.
Compute GCP Tier 2 Recharge Standard secure Google Cloud project shells. P4 Requires a grant-funded COA. Standard P3/P4 data.
Compute UCR Secure Enclave (GCP) Highly specialized, locked-down GCP environment. P4 / NIST 800-171 Rev 2 / CMMC Level 2 Tier 2 Recharge. Required for NIH dbGaP, DoD, DOE.
Compute CHASS Server Room On-premise secure physical hosting. P4 Strictly limited to CHASS researchers. No office workstations.
Storage HPCC-GPFS Cluster Storage High-performance cluster storage attached to the HPCC. P3 High-speed, parallel computing storage suitable for compute-intensive tasks.
Storage Ceph Secure Research Storage Scalable, resilient storage solution designed for diverse research needs. P3 Upcoming enhancement to UCR’s research computing infrastructure.
Storage UCR Google Drive Cloud-based storage solutions for collaboration. P3 P3 data allowed with strict sharing controls. P4 generally prohibited unless authorized by ISO.

Collaboration for Security

Collaborating with UCR’s Research Computing Team ensures that your research projects are secure and compliant with the latest data protection standards. Our team is dedicated to supporting UCR researchers in navigating the complexities of research security, offering tailored solutions that meet the unique needs of each project.