Chapter 8: Designing for Research

https://leanpub.com/campusciso_it_policy

The Research Distinction

https://leanpub.com/campusciso_it_policy

Principal Investigators Are Like Entrepreneurs

https://leanpub.com/campusciso_it_policy

Research Computing: A Different Architecture

https://leanpub.com/campusciso_it_policy

Why Research Computing Doesn’t Fit Typical Security Controls

https://leanpub.com/campusciso_it_policy

A General Approach: Tiered Environments

https://leanpub.com/campusciso_it_policy

What This Means for Your Program

https://leanpub.com/campusciso_it_policy

How Research Governance Works

https://leanpub.com/campusciso_it_policy

Research Governance Has Its Own Authority Structure

https://leanpub.com/campusciso_it_policy

What This Means for Governance

https://leanpub.com/campusciso_it_policy

How Research Data is Managed

https://leanpub.com/campusciso_it_policy

Research Data Management Plans

https://leanpub.com/campusciso_it_policy

Data Retention Might Span Decades

https://leanpub.com/campusciso_it_policy

Sharing Requirements for Research Data

https://leanpub.com/campusciso_it_policy

Research Sponsors May Have Additional Requirements

https://leanpub.com/campusciso_it_policy

How Research Requirements Shift Security Priorities

https://leanpub.com/campusciso_it_policy

What This Means for Your Planning

https://leanpub.com/campusciso_it_policy

Chapter 8 Key Takeaways

https://leanpub.com/campusciso_it_policy