Singularity Containers Containers for HPC, analytics, machine learning, reproducible and trusted computing

By Staff

Feb 7, 2018 | Blog, Media

Presented by David Godlove at MAGIC meeting on February 7, 2018



• Base security assumption: Untrusted users running untrusted containers
• Limit user’s potential security contexts: We can not allow users to escalate to root, even

in containers that they control (and know the root password to)
• Allow user’s access to data they own: And limit access to data that they don’t own

Join Our Mailing List

Related Posts

QA and Stability in Singularity

There are many different approaches that can be taken when building software. At one end of the spectrum is the extreme caution and conservatism that’s appropriate, for example, of safety critical code used in vehicles or in real-time operating systems. At the other...

read more