Singularity Containers Containers for HPC, analytics, machine learning, reproducible and trusted computing

By Staff

Feb 7, 2018 | Blog, Media

Presented by David Godlove at MAGIC meeting on February 7, 2018



• Base security assumption: Untrusted users running untrusted containers
• Limit user’s potential security contexts: We can not allow users to escalate to root, even

in containers that they control (and know the root password to)
• Allow user’s access to data they own: And limit access to data that they don’t own

Join Our Mailing List

Recent Posts

Related Posts