eCUI is a virtual computing infrastructure to support research projects involving Controlled Unclassified Information (CUI) data which must follow the NIST 800-171R1 standard for data protection. The eCUI environment is comprised of a series of technical and administrative controls designed to protect data and is configurable to support a range of research computing needs. A separate CUI instance is created and used for each project.
- Virtual desktops and servers configured to run Window 10, Windows Server 2016 or Red Hat Linux v7
- Options for memory and storage to meet research requirements
- Installation of approved software onto the virtual systems
- Secure data transfer in and out of the controlled environment
Getting This Service
Note: Only Principal Investigators (PI) (or designees) of research projects can request these services. Faculty, staff, students, and others involved in the research project and authorized to access the environment can use it.
Principal Investigators (PI) of research projects should first request the research consultation service to review the technical requirements for their research project with the Office of Research Computing and Information Technology Services. If eCUI is determined to be a suitable platform, the PI will be provided information on how to request the project setup in eCUI. The request will be reviewed to ensure the project has an approved Technology Control Plan and that all project personnel have undergone background checks and have completed the required training. Once the project has been provisioned, the PI can request to add/remove users and software to the virtual computing system and request Globus Access or Allolist for Data Transfer in/out of the environment.
This service is available 24/7, excluding planned outages, normal maintenance windows, and unavoidable events. Maintenance windows are Sundays from 7 to 11 a.m. but may be extended to 2 p.m., if needed. If maintenance is required outside of these hours, it will be announced on the Outages & Bulletins page.
All users of the George Mason University network must adhere to University Policy Number 1301: Responsible Use of Computing.
Users must also adhere to:
Once the project has been approved, all project personnel must complete Export Control, Insider Threat, ITS Security Awareness training and TCP or CUI-SP training prior to being granted access to the eCUI environment.
Configuration Options and Details
Key: O= Optional; *= Configurable with ITS Review
|OS||Windows 10||Windows Server 2016||Windows Server 2016||RHEL Desktop||Purpose Built Virtual Server (as needed)|
|Use Case||Virtual Desktop delivered via Citrix||Server for Resource Intensive Applications||Purpose Built Virtual Server (as needed)||Virtual Desktop delivered via Citrix||Purpose Built Virtual Server (as needed)|
|GPU (Graphics Only)||Future||Future||Future|
|Security Review Required||Yes||Yes|
|Local Storage (GB)||100||100 *||100 *|
|Project Storage (GB)||200*||200*||200*||200*||200*|
|Home Storage (GB)||10||10||10||10||10|
|Power Management (Reboot Schedule)||Logoff & Nightly||Weekly||Negotiable||Logoff & Nightly||Negotiable|
|Network||Fixed CUI VRF||Fixed CUI VRF||Dedicated VRF||Fixed CUI VRF||Dedicated VRF|
|Firewall||ITS Managed||ITS Managed||ITS Managed*||ITS Managed||ITS Managed*|
|Management Agents||WMware Tools, SCCM, Tenable||WMware Tools, SCCM, Tenable||WMware Tools, SCCM, Tenable||WMware Tools, Puppet, Tenable||WMware Tools, Puppet, Tenable|
Key: L= Local Install; A= Available via Citrix Workspace
|Web Server||O - MSSQL||O - MySQL|
|7-Zip 19.00 x64||L/A||O||A|
|Active Perl 5.26.1 Build 2601 64-bit||A||O||A||O|
|Adobe Acrobat Reader DC||L/A||O||A|
|Anaconda3 2018.12 64-bit||A||O||A||O|
|IBM SPSS Statistics 26||A||O||A||O|
|IDLE Python 3.7 64-bit||A||O||A||O|
|PuTTY 0.70 64-bit||A||O||A|
|R x64 3.5.3||A||O||A||O|
|SAS 9.4 English||A||O||A||O|
|StataMP 15 64-bit||A||O||A||O|