Who is Secure Research Computing?

Secure Research Computing is a small team of specialists that develop, support and maintain secure research computing resources for the campus.  This group is available to connect you with and field questions you may have regarding various existing campus solutions supporting research that falls under various compliance data protection regulations. We work in close partnership with many campus services including the Office of Information Technology's Information Security, the Office of Export Controlsthe Center for National Security Initiatives and many others.

For general inquiries you can email the team at rc-help@colorado.edu and specify "Secure Research Computing" in the subject line.

What is The Preserve?

The Preserve is an environment available to researchers who engage in projects that contain confidential or highly confidential data.  It is highly controlled to specifically protect research that must eventually meet Cybersecurity Maturity Model Certification (CMMC) 2.0 Level 2, Controlled Unclassified Information (CUI) and certain Export Control regulations.  This environment includes the following core services.  

  • Microsoft Office 365 GCC High is a secure cloud-based suite of solutions that includes Exchange Online as the email and calendaring environment, Word, Excel, PowerPoint, OneNote, OneDrive and Teams.  These may be used for collaboration on research proposals and projects both internally and with trusted sponsors or collaborators.  
  • The CU Secure Research Computing environment hosted in Azure Government includes a highly secure landing zone and environment that researchers may use to develop and run infrastructure and applications for their protected research projects. 

Who Can Get It?

Any researcher or research support staff who work with confidential or highly confidential data can request access to the environment, however given that the environment is designed for CUI and Export controlled projects,  all users of the environment will need to consider the costs of O365 licenses and Azure government computing resources and must adhere to stringent policies, standards and procedures required to protect it.   See CUI Policy. 

Additional Resources (login required):