How does Sun help to secure my Sun Grid Utility account?
All users must receive approval for access to the Sun Grid Utility Services. After access is granted, users can submit jobs. These jobs run under control of the grid scheduling system and Solaris 10. As an additional security measure, Sun Grid Utility users are not allowed to directly access execution processors (compute nodes), and their jobs can not directly access Internet sites. The Sun Grid Compute Utility provides the following layered defenses around critical information assets: Physical security: Sun Grid Utility centers are located in secure sites, all networking/ systems/storage equipment is in locked cages with limited access by pre-cleared personnel. Architectural security: The Sun Grid Utility is designed with Solaris and network security isolation for user jobs, and with role-based access principles. The Sun Grid architecture design incorporates the principles of minimal privilege for users and administrators, hardening of systems and network components along with best pr