skip to Main Content

Singularity Containers Containers for HPC, analytics, machine learning, reproducible and trusted computing

Presented by David Godlove at MAGIC meeting on February 7, 2018

HPC COMPATIBLE SECURITY MODEL

• Base security assumption: Untrusted users running untrusted containers
• Limit user’s potential security contexts: We can not allow users to escalate to root, even

in containers that they control (and know the root password to)
• Allow user’s access to data they own: And limit access to data that they don’t own

https://www.nitrd.gov/nitrdgroups/images/d/d2/SingularityContainers_DGodlove.pdf

Back To Top