Determine security tier#

Before starting any Turing project, you should have completed a Data Protection Assessment Process (DPAP) in consultation with the Turing Data Protection Team. It is likely that there will also be various data sharing agreements (DSAs) in place.

Security tiers#

The Turing TRE can operate in three different configurations, known as security tiers. Adding technical controls can reduce the chance of a data incident but may also impose additional constraints on the 🧑‍🔬 Project team.

Security control

Tier 1

Tier 2

Tier 3

Inbound connections

Anywhere

Approved networks

Approved networks

Outbound internet

Allowed

Forbidden

Forbidden

User devices

BYOD

BYOD

Managed

Copy-and-paste

Allowed

Forbidden

Forbidden

Data ingress

Allowed

Approval needed

Approval needed

Data egress

Allowed

Approval needed

Approval needed

Software libraries

Any

PyPI/CRAN

Approval needed

Important

Based on the DPAP and DSAs the 🧑‍🔬 Project team should decide on the appropriate SRE security tier for the project

Guidance#

When deciding on the appropriate tier you may want to consider the following factors:

  • Personal data

    • Consider whether personal data might be present in non-obvious ways (for example names, faces or IDs visible in images)

    • If the project will be handling any special category data a higher security tier may be appropriate

  • Medical data

    • Data that is easily available to researchers without restriction, is likely to require a lower security tier

    • Data that has been rigorously pseudonymised is likely to require a lower security tier

  • Commercially-sensitive data

    • Consider whether any personal data (for example on customers or employees) is included in the data