- Hardened, distroless images rebuilt regularly to reduce CVEs
- SBOMs and provenance to support audits and compliance workflows
- Least-privilege defaults and container isolation patterns
- Multi-accelerator support across CPU and common GPU stacks
How Teams Use It
- Standardize model serving stacks across environments (dev → prod)
- Satisfy vulnerability and provenance requirements with SBOMs and rebuild cadence
- Run with least privilege and network isolation by default
Security Posture
- Distroless base with reduced attack surface
- Regular rebuilds to pick up upstream security fixes
- Drop Linux capabilities and enforce no-new-privileges
- Read-only filesystems and network-off defaults in reference configurations

