Security
Principles
- Read-only system base
- Container isolation
- Minimal attack surface
- No credentials in repo
Best Practices
- System: Keep root filesystem read-only
- Containers: Use non-privileged containers
- Network: Firewall on host
- Credentials: Never commit secrets
Threats Mitigated
- Host compromise via app vulnerabilities
- Persistence attacks (read-only prevents)
- Credential theft (none stored)