The goals of this engagement include the following tasks.
- Review existing Jupyter deployment documentation related to security, identify gaps, and create recommendations for improvements.
- Identify Jupyter deployment use-cases as targets for Jupyter Security Best Practices documentation. Example use-cases include DOE supercomputing centers, campus research clusters, workshops, small scientific projects, etc. Prioritize these use-cases based on which audiences would benefit most from new security documentation.
- Write Jupyter Security Best Practices documentation for high priority use-cases identified above. Work through other use-cases as time permits.
The Jupyter Security Best Practices documentation produced by this engagement will be shared with Project Jupyter for inclusion in their documentation, and also presented at the workshop.
To read Jupyter's blog post about the engagement, click here.