Our IT is concerned about any user installing malicious packages by accident. At the moment we have two primary virtual environments for our applications, which only privileged users can modify. But I would be concerned that users might want to set up their own virtual environment or install packages for their user in order to have more control.
How can we restrict the use of pip
to members of a certain group/super users who have write access to shared virtual environments? Are there special considerations when a lot of Ubuntu depends on Python?
sudo
group, nor add them to/etc/sudoers
. Then they won't be able to modify the system software. Also promulgate a HR policy: "Mess with the system and you're OUT!" (rephrase for local regulations. – waltinator Jan 08 '24 at 23:56!pip install
from within a notebook by not giving them write access to the virtual environment – raphael Jan 26 '24 at 14:31pip
in their user space either, because it creates virtual user space for users. Which is a must so that Notebooks can run/work. (It gives terminal access to userspace still) – Thomas Ward Jan 27 '24 at 02:06