Singularity Containers Containers for HPC, analytics, machine learning, reproducible and trusted computing

By Staff

Feb 7, 2018 | Media

Presented by David Godlove at MAGIC meeting on February 7, 2018



• Base security assumption: Untrusted users running untrusted containers
• Limit user’s potential security contexts: We can not allow users to escalate to root, even

in containers that they control (and know the root password to)
• Allow user’s access to data they own: And limit access to data that they don’t own

Related Posts

RIKEN’s Fugaku Utilizes Sylabs’ SingularityPRO

Sylabs is proud to announce that the world’s fastest supercomputer, RIKEN’s Fugaku, has selected SingularityPRO:   SingularityPRO offers the team at RIKEN the widest range of supported scenarios for their researchers to secure applications via Singularity Image...

read more

Pin It on Pinterest