skip to Main Content

Singularity Containers Containers for HPC, analytics, machine learning, reproducible and trusted computing

Presented by David Godlove at MAGIC meeting on February 7, 2018


• Base security assumption: Untrusted users running untrusted containers
• Limit user’s potential security contexts: We can not allow users to escalate to root, even

in containers that they control (and know the root password to)
• Allow user’s access to data they own: And limit access to data that they don’t own

Back To Top