Secure Azure high-performance computing (HPC) in Azure

Best practice encourages customers to create a single centralized cloud adoption strategy, using the Cloud Adoption Framework's Security methodology

Security principles

The focus of HPC is based on key management principles:

Principle Description
Single authoritative source of identity Use consistency and a single authoritative source to increase clarity, and reduce the risk from human error and configuration and automation complexity.
Automated approach to data security Use automation to enable auditing, implement multiple control points, and reduce human errors. Automation also makes data governance easier and limits overhead.
Grant least privilege required to complete task Grant only the amount of access to users that they need to do their jobs and limit the allowed actions for a particular scope.
Simplified yet secure permissions Avoid customization. Customization leads to complexity, which inhibits human understanding, security, automation, and governance. For example, use built-in roles to assign permissions to data services and avoid permissions that specifically reference individual resources or users.
Better clarity and enforceability of rules and definitions Clearly separate data to help keep the environment organized, while making it easy to enforce security rules and definitions.

It is also recommended to follow the security baseline recommendations for the following HPC services:

  • Azure HPC Cache: Ensure that network security, identity management, privileged access, data protection, asset management, logging/threat detection, posture/vulnerability management, and backup/recovery is in place.
  • Azure CycleCloud: Have your HPC administrator setup SSL, configure networking and secret management, and create a secure locked-down environment.
  • Azure Batch: Use the latest Azure Security Benchmarks available to implement recommendations on securing your Batch nodes based on the appropriate compliance standard.

Next steps

  • After creating your HPC cloud adoption security strategy, look into organizing team members to align the teams and roles supporting your organization's cloud adoption efforts.
  • For additional security information, refer to best practices defined in the Azure HPC Well-architected framework.