Use Singularity on UITS supercomputers

Prerequisites

  1. Secure your own environment.

Directions

  1. Please visit this KB page.

  2. If you have sensitive data in your container, ensure that it stays on a system that is at an appropriate level of protection.  For instance, if you have PHI, container images should stay on an IU system approved for PHI.

Email securemyresearch@iu.edu if you have cybersecurity or compliance related questions about Singularity.

Approved for

Use of Singularity on U supercomputers are approved for PHI,  but subject to "Shared responsibility model for securing PHI on UITS systems" and (2) below.

We want your feedback

Please email securemyresearch@iu.edu to report errors/omissions and send critiques, suggestions for improvements, new use cases/recipes, or any other positive or negative feedback you might have.  It will be your contribution to the Cookbook and appreciated by all who use it.