Singularity Containers Containers for HPC, analytics, machine learning, reproducible and trusted computing

By Staff

Feb 7, 2018 | Blog, Media

Presented by David Godlove at MAGIC meeting on February 7, 2018



• Base security assumption: Untrusted users running untrusted containers
• Limit user’s potential security contexts: We can not allow users to escalate to root, even

in containers that they control (and know the root password to)
• Allow user’s access to data they own: And limit access to data that they don’t own

Join Our Mailing List

Related Posts

An Introduction to Singularity Containers

Enabling Portable and Secure Computing Environments for High-Performance Workloads.As part of their ongoing efforts to streamline workflows, enhance productivity, and save time, engineers, and developers in enterprises and high performance computing (HPC) focused...

read more

New virtual data fabric to support DoD cyber testing

As cybersecurity threats increase in complexity and volume, the Department of Defense is turning to new technologies for help.DeciSym and Sylabs recently joined forces to develop a virtual data fabric for the Department of Defense. The Measure & Share Storage Virtual...

read more