┌─────────────────────────────┐
│ Host System │
│ ┌───────────────┐ │
│ │ Container 1 │ │
│ │ ┌───────────┐ │ │
│ │ │ App A │ │ │
│ │ └───────────┘ │ │
│ └───────────────┘ │
│ ┌───────────────┐ │
│ │ Container 2 │ │
│ │ ┌───────────┐ │ │
│ │ │ App B │ │ │
│ │ └───────────┘ │ │
│ └───────────────┘ │
└─────────────────────────────┘
Isolation keeps containers separate.
Image security ensures safe blueprints.
Access control limits who manages containers.
Runtime protection watches running apps.
Network security protects communication.
Diagram showing containers isolated within a host system with key security aspects labeled.