Security
Defense-in-depth security features for production deployments.Principle of least privilege
Services drop to minimum required permissions:Current features
Capabilities (Linux)
Services retain only specified capabilities:Resource limits
Prevent resource exhaustion:Namespace isolation
Isolate from host system:Upcoming features
| Feature | Status | Purpose |
|---|---|---|
seccomp | Planned | System call filtering |
apparmor_profile | Planned | Mandatory access control |
selinux_context | Planned | SELinux labels |
private_devices | In progress | Device isolation |
private_tmp | In progress | Temp directory isolation |
Best practices
Run unprivileged when possible
Drop privileges immediately
--drop-privileges affects child service spawning (start/restart) and does
not change privileges for read-only control commands.
Isolate untrusted workloads
Troubleshooting
Permission denied on namespace creation- Add
CAP_SYS_ADMINcapability
- Set
limits.cgroup.rootto writable path
- systemg preserves
LISTEN_FDSautomatically
See also
- Privileged Mode - System-level features
- Configuration - Security options