Sensitive Data services for research
Introduction to the user guide
In this userguide you can:
find an overview and key features of each service;
follow simplified, step-by-step instructions on how to access and set up the services; previous knowledge is not required. Specific paragraphs are marked as advanced if technical and coding skills are necessary.
watch 1 to 3 minutes video tutorials that will support you through each step;
find quick technical suggestions in the troubleshooting table.
Introduction to the services
Sensitive Data services for research consists of four components, all accessible from your browser:
Sensitive Data Connect: a user interface for storing and sharing encrypted sensitive data during the active phases of research projects.
Sensitive Data Desktop: a user interface that provides access to a secure virtual computer (or virtual Desktop). The Desktop is not connected to the internet. This enables secure computation and processing of sensitive data. All CSC project members and collaborators can access the same private Desktop. As data can not be exported from SD desktop unless specifically authorised by the CSC project manager, it can be used to provide limited and restricted access to a specific dataset.
Sensitive Data Submit (pilot phase): allows publishing sensitive data under controlled access.
Sensitive Data Apply (pilot phase): promotes data reuse allowing data owners to manage access to published datasets via a simple user interface.
To facilitate this process, when you create a new CSC project using the MyCSC portal, you are guided to accept CSC's Data Processing Agreement (DPA) and describe the type of data you are processing in the "Description of processing activities" form. You can then download these documents and share them with the legal services in your organisation or the Data Controller's legal representative. If you have any questions or additional legal agreements are needed between your organisation and CSC, contact us at firstname.lastname@example.org (email subject: Sensitive Data).
In case you need to draft a Data Protection Impact Assessment (DPIA), you can find the technical and organizational security measures for the protection of sensitive data in CSC Sensitive Data service available for download here.
Sensitive Data Services are available for all CSC customers. To access CSC's services for sensitive data using MyCSC portal:
Create a user account.
Create or join a CSC project and add project members.
Fill in the Description of processing activities form and agree with CSC Data Processing Agreement.
Each project member needs to add service access to SD Desktop and to Allas (in case you want to use SD Connect, a user interface for CSC cloud storage solution called Allas).
Activate Multi-factor Authentication.
Apply for billing units or disk quota.
For specific guidance regarding these steps, check the Accounts paragraph at the beginning of this user guide.
Allas: a cloud storage service of CSC. SD Connect is a user interface that specifically facilitates sensitive data encryption and storage in Allas. Users can also access Allas programmatically with interfaces for non-sensitive data.
Billing units: billing units are used to monitor the resource when CSC services can are free-of-charge or when the user pays the use of the services.
Bucket/Container: these two terms refer to the main folder (technically called root folder) where data are stored in SD Connect/Allas. The bucket/container name is visible to the internet. You can have multiple buckets in the same project (up to 500), but each bucket must have a unique name throughout the whole storage system (including other projects). By default, the data in a bucket is accessible just to the project members. However, you can share and grant access to other CSC projects or users with SD Connect.
CSC Project: using CSC services is based on projects: all your data in CSC belong inside a project. You can be a project member in one or multiple projects. Each project has a main user, called the CCS project manager, who can add members and services to the project. A project manager is responsible for the activities of the project. They, for example, need to describe which type of sensitive data the project is processing.
Disk quota: this is a limited set to control the storage space available to CSC services users. SD Connect has a default quota of 10 TB. You can apply for more writing at email@example.com.
Multi-factor Authentication: When you log in to the SD Desktop service, next to authenticating by providing a username and password, you need to go through an extra verification step. In this way, your account is more secure. The extra verification step is called:"Two-Step Verification" or "Multifactor Authentication", because you are proving your identity via a different method. In this case, you need to type in a one time code (6-digits) obtaned by opening a mobile app on your phone. The code is unique and valid for a limited amount of time.
Object: is the technical name for a file stored in a cloud object storage like Allas (or uploaded to CSC via SD Connect). This definition underlines that files stored in SD Connect / Allas can not be directly modified unless transferred or copied into a computing environment. Still, they can be accessed in read-only mode from a cloud computing environment (e.g. SD Desktop).
Project Identifier: it is a synonym of CSC Project ID when using the command-line tool. In the SD Connect user interface is displayed under User Information> Project usage and displayed as a series of 32 numbers and letters: e.g. AUTH_3a66dbf90b2940dc9c651362af595b23.
Virtual machine (VM): is a virtual computing environment (or virtual computer) that works as an actual physical computer. It has a processor, memory, and operating system, but it exists only as a code or a partition of the host computer, in this case in CSC’s data center. The VMs used for the Sensitive Data services are entirely isolated from the internet for security reasons.
Virtual machine flavor (VM flavor): a flavor defines the resources and configurations of a cloud computing environment. It specifies the compute, memory, and storage capacity that can be assigned to the virtual machine.