YellowDog operates on the principle of security by design. Our commitment to providing a secure platform is ingrained in every aspect of our architecture, delivery, and operations. This white paper delves into our approach to security, focusing on our pull-based architecture, secure software development processes, cloud provider credential storage, instance provisioning in the cloud, and access control features.
An Evolving Threat Landscape
Traditional HPC clusters typically took an open approach to security – inside the cluster, everything had root access to everything else, all jobs and storage were equal, and security was only enforced at the network perimeter. This is no longer sufficient with advanced threats and complex infrastructure configuration. Integrity As workloads move around the cloud and across hybrid/on-premise clusters, customers are demanding enforcement of the same or richer policies and controls. YellowDog’s platform has been developed over a decade to support complex HPC and HTC workloads across these environments, returning control and observability of security posture to the customer.