What are the best security measure for ensuring that CT are well contained and the users does not have access to the main node or other containers.
I understand setting the CT as 'unprivileged' would help a great deal but I was wondering if there are other best practises especially based on experience from those who might have used CT in production.
I understand setting the CT as 'unprivileged' would help a great deal but I was wondering if there are other best practises especially based on experience from those who might have used CT in production.