|
| 1 | +--- |
| 2 | +short_title: Introduction |
| 3 | +--- |
| 4 | +# Architecture and Governance |
| 5 | + |
| 6 | +This section details the architecture and governance of a FRIDGE deployment. |
| 7 | +It explains the basic concepts underpinning FRIDGE, details of the governance roles and processes, and the technical architecture. |
| 8 | + |
| 9 | +## Executive Summary |
| 10 | + |
| 11 | +TREs can be constrained by the computing resources available to them. |
| 12 | +This could hinder research. |
| 13 | +FRIDGE enables the use of computing power from external resources, such as cloud or HPC, in an existing TRE. |
| 14 | + |
| 15 | +The approach to solving this problem is to extend the governance boundary of an existing TRE to the external resource. |
| 16 | +This is achieved by provisioning a secure enclave to the external infrastructure into which the FRIDGE satellite TRE is deployed. |
| 17 | +In effect, a portion of the external system is borrowed by the TRE and brought under the control of the TRE, and its existing governance and administrators. |
| 18 | + |
| 19 | +The advantage of this approach is, as we can formally consider the FRIDGE deployment part of an existing TRE, there is no need to involve the external infrastructure provider in data sharing agreements or rewrite existing agreements with data owners. |
| 20 | + |
| 21 | +## Key Concepts |
| 22 | + |
| 23 | +There are a number of concepts central to FRIDGE that are important to understand. |
| 24 | + |
| 25 | +:::{glossary} |
| 26 | +Trusted Research Environment |
| 27 | +: A secure computational environment designed for conducting research on sensitive data. |
| 28 | + TREs must balance an appropriate level of security for the data being processed, |
| 29 | + and usability to enable researchers to work effectively and efficiently. |
| 30 | + |
| 31 | + FRIDGE assumes an existing TRE, with its own security controls and governance. |
| 32 | + FRIDGE places few requirements on that TRE other than establishing a connection to a FRIDGE instance. |
| 33 | + |
| 34 | +Satellite TRE |
| 35 | +: An adjunct to an existing TRE that provides extra functionality or computational resources. |
| 36 | + A satellite TRE is not a full TRE itself, and requires a home TRE to operate. |
| 37 | + |
| 38 | + FRIDGE is an example of a satellite TRE. |
| 39 | + |
| 40 | +Roles |
| 41 | +: The operation of a FRIDGE instance depends on people, most likely, split between multiple organisations. |
| 42 | + Their responsibilities and access form a key part of FRIDGE's security and governance. |
| 43 | + As such, we have defined [roles](#arch-roles) for FRIDGE and outlined their scope and purpose. |
| 44 | + This scheme helps clarify who is responsible for infrastructure or processes irrespective of which organisation they belong to or what their job title is. |
| 45 | + |
| 46 | +Governance Boundary Extension |
| 47 | +: The integration of resources owned by an external organisation into the control and governance of an existing TRE. |
| 48 | + Asserting the TREs governance over the satellite TRE is essential for the operation of FRIDGE, and avoiding complex data sharing agreements between the {term}`Data Owner`, {term}`TRE Operator Organisation`, and {term}`FRIDGE Hosting Organisation`. |
| 49 | + This arrangement is enabled by FRIDGE's technical and governance security controls. |
| 50 | + |
| 51 | +TRE Tenancy |
| 52 | +: The components that form the secure enclave into which the satellite TRE can be deployed. |
| 53 | + The tenancy must ensure that data, processes and network traffic inside are opaque to, |
| 54 | + |
| 55 | + 1. the host system |
| 56 | + 1. other tenancies. |
| 57 | + |
| 58 | +Shared Responsibility |
| 59 | +: As the FRIDGE infrastructure, is split between organisations, there is no single organisation that takes sole responsibility for a FRIDGE instance and its operation. |
| 60 | + The shared responsibility model defines the boundaries of each organisations responsibility. |
| 61 | + For efficient operation it is important that the {term}`TRE Operator Organisation` retains responsibility for data processing. |
| 62 | + However, it is not possible to remove all responsibility from the {term}`FRIDGE Hosting Organisation`, for example in deploying a secure {term}`TRE Tenancy`. |
| 63 | + |
| 64 | + The general principle of FRIDGE is to minimise the responsibility of the {term}`FRIDGE Hosting Organisation`. |
| 65 | + |
| 66 | +Defence in Depth |
| 67 | +: The use of multiple layers of security control so that if one control is broken or circumvented, the overall system remains secure. |
| 68 | + The worst-case scenario is the unauthorised egress of data from a FRIDGE instance. |
| 69 | + In FRIDGE we aim for no single point of failure and have ensured that no single failure would, on its own, lead to that outcome. |
| 70 | + |
| 71 | +Five Safes |
| 72 | +: The [Five Safes Framework](https://ukdataservice.ac.uk/help/secure-lab/what-is-the-five-safes-framework/) sets out a method for understanding the range of factors affecting data security in research. |
| 73 | + It can be used as a guide to designing or assessing TREs. |
| 74 | + The framework splits data security into five components, safe data, safe projects, safe people, safe settings, and safe outputs. |
| 75 | +::: |
0 commit comments