...
Beware also of data-level access control, and how to work with replicated data. This usually needs a data access management system, such as the Resource Entitlement Management System (REMS), a tool for managing access rights to data and datasets, or the
When risk assessment is absolutely critical ...
...
- Open Science Cyber Risk Profile by TrustedCI, Sean Peisart et al.)
- IT Security Risk Management v2 (EC framework)
- ISO 27005
- AARC-G042 Data Protection Impact Assessment – an initial guide for communities
- Global Alliance for Genomics and Health
- Resource Entitlement Management System (REMS)