Security and Limiting Containers. . . . . . . . . . 1 Things to Worry About . . . . . . . . . . . . . . 2 Defense in Depth . . . . . . . . . . . . . . . . . 5 Segregate Containers by Host . . . . . . . . . . . 6 Applying Updates . . . . . . . . . . . . . . . . . 8 Image Provenance . . . . .