Secure Research Environment (SRE)

UMB’s Secure Research Environment (SRE) offers researchers a safe, cloud-based workspace to analyze sensitive data without the risk of exposure or misuse. Researchers can log in from any location via a secure virtual desktop to work with approved datasets and tools, ensuring that all information remains protected in the cloud. Designed to support faculty-led research projects—particularly those handling PHI or other regulated data—the SRE combines robust security protocols with the adaptability essential for modern research.

Learn More about the SRE:

To learn more about the SRE, additional information can be found on the following pages: 

Join UMB's SRE Community:

The SRE is designed to support secure, efficient research — and CITS is here to help. If you have questions about available software, licensing, or the request process, we encourage you to join the SRE open sessions the last Friday of every month with a CITS IT Cloud Architect Specialist.

These sessions are a great opportunity to:

  • Ask questions about SRE software and licensing
  • Get guidance on submitting software requests
  • Learn tips for making the most of the SRE

Whether you’re new to the SRE or a regular user, these sessions are a helpful way to stay informed and supported. 

Forum | SRE Community 

Contact Information for SRE Access

SRE Guidebook & Glossary:

Safeguarding health-related information and other sensitive personal data, including Social Security numbers is a critical priority to UMB. The Secure Research Environment (SRE) has been established to ensure the protection of both this data and intellectual property generated from research studies. Utilization of the SRE is mandatory for any research that involves sensitive data, such as data supplied by the University of Maryland Medical System (UMMS). The SRE adheres to HIPAA regulations and relevant IT security policies to secure Protected Health Information (PHI) and Personally Identifiable Information (PII).

Security Compliance

We are pleased to announce that our Secure Research Environment (SRE), built in Microsoft Azure, has received formal approval for its System Security Plan (SSP) for use by the Department of Defense (DoD). This approval confirms that our environment meets the requirements of NIST 800-171, ensuring robust protection of Controlled Unclassified Information (CUI) in accordance with federal standards.

In parallel, we are actively preparing a submission for an NIST 800-53 compliant environment to further extend our capabilities and compliance coverage. This next phase will support broader research initiatives and enhance our alignment with federal cybersecurity frameworks.

 We appreciate the continued collaboration across teams and will share updates as the 800-53 submission progresses. For questions or further details, please contact the SRE support team.

For definitions to SRE related abbreviations or to learn more about how PHI & PII are defined, download & print the SRE Glossary here pdf or view the glossary from the drop-down menu below. 

Appendices:

Azure, Microsoft’s cloud platform, is an evolving collection of integrated Cloud Services spanning compute, data storage, and software applications.

Reduced operational overhead.  No need to:

  • Dedicate physical space for computing equipment.
  • Monitor hardware health, manage firmware, and repair failed hardware.
  • Perform complex hardware replacements.
  • Size, purchase, house, & maintain:
    • Server and data storage equipment
    • Datacenter networking equipment
    • Complex datacenter network connectivity
    • Uninterruptible power supply (UPS) equipment and power feeds
    • Large, expensive HVAC equipment

Capacity

  • Azure has massive compute capacity, virtually unlimited computing resources that can scale as needs grow. We have the ability to quickly provision resources, such as servers, in extremely large quantities, use those resources for as long as necessary and immediately de-provision them when they are no longer required.  This model eliminates the need for over-provisioning resources to meet unknown future demands.

Agility

  • Virtual servers can be provisioned and deployed quickly, rather than taking weeks or months needed to procure and configure on-campus equipment.

Redundancy

  • Microsoft has 69 Azure geographic regions, which offers system redundancy across regions.
    • Traditional on-premises redundancy requires doubling hardware which must be maintained for just-in-case situations and sits mostly idle. Microsoft’s hardware infrastructure is fully redundant with the cost spread across all Azure customers to minimize the cost of infrastructure redundancy to UMB. This alleviates concerns related to the availability and disaster recovery of on-campus data centers.

Availability

  • The Microsoft agreement with University of Maryland, Baltimore (UMB) assures high availability, with an almost 100% Azure uptime/availability.

Sustainability

  • Shift UMB power consumption for computing to renewable energy sources.
    • Microsoft is dedicated to their increased use of green and renewable energy sources to power their datacenters. Microsoft has a commitment to sustainability, making a $1 billion investment in a climate fund; UMB computing power consumption and carbon footprint will be reduced by using Microsoft Azure

Security

  • IT security and data protection is enhanced by leveraging Microsoft’s personnel and sophisticated security tools. Microsoft has over 3,500 security experts who continually monitor sensitive data stored in Azure. Microsoft invests over $1 billion annually in IT security.

Cost

  • The pay-as-you-go model for the cloud infrastructure only requires paying for those services (compute and storage) that are used and consumed over a particular period of time. There is a reduced cost to run Windows computers in Azure due to the Master agreement that UMB has with Microsoft; and we achieve cost savings with the pay-as-you-use subscription model.

Partnerships

  • Microsoft also has an Innovation/Research focus, having established partnerships with the National Science Foundation and National Institutes of Health to provide computing resources to research organizations, e.g., STRIDES program (Science and Technology Research Infrastructure for Discovery, Experimentation & Sustainability).

AVD is a Microsoft Azure-based system used for accessing the Azure Cloud infrastructure. With an Internet connection, it provides access to applications and data in Azure.  The hardware used for access does not need strong computing capabilities since that work is handled on the virtual end in Azure. 

  • The Azure Virtual Desktop (AVD) infrastructure is an important element in enhancing the security of data. AVD provides secure access to data stored in highly secured computing environments.
  • AVD provides direct access, after logging in, to the software that you need and to your file/data storage.
  • The presentation of AVD is very similar to logging in remotely to your desktop.
  • AVD accounts can be quickly created.
  • The computing resources within an AVD account can quickly scale to meet the computing needs of the user.
  • There is a reduction in physical server hardware and hardware maintenance costs.
  • There is no longer a need to buy and use costly, high-end computers.
  • AVD supports multiple computing endpoints: Windows, Apple, Chromebook, and Android.
  • There is a persistent user experience, where an individual can get access to applications and data at any time and from anywhere.

 

The University of Maryland, Baltimore (UMB) Secure Research Environment (SRE) is a centralized virtual environment designed to protect sensitive and restricted research data.  Secure virtual desktop environments and custom compute allow researchers to access sensitive data under a higher level of control and data protection. Data is segregated per research project and only accessible by the research team that is assigned to the enclave.

Azure Defender for Cloud helps keep your data and applications safe when you're using Microsoft's Azure cloud services. It scans for any suspicious activity or potential problems and takes action to prevent or address them, making your cloud environment more secure.  It will be enabled for all subscriptions as part of the deployment automation.

  • User authentication is configured to the existing UMB Azure active directory tenant and active directory service.
  • Private network access is isolated from existing UMB networks.
  • All access to the secure enclave resources will be via endpoints in AVD.
  • Monitoring, logging and reporting will be via Azure Log Analytics Workspace in the SRE Environment.
  • Approved data is brought in and out of project-specific secured enclaves via an Honest Broker/Data Steward.
  • Only de-identified data is allowed to leave the SRE environment.
  • Access to the public internet is blocked from within the SRE environment.
  • A NIST 800-171 compliance policy will be applied as a default to research subscriptions; research/funding source requirements may require NIST 800-53 to be applied in certain instances.
  • All Platform as a Service (PaaS) services will be deployed with private endpoints and public access disabled except where required.
  • Azure Cloud Security Posture Management is enabled.
  • Defender for Cloud Workload Protection enabled where required.