The following security checklist covers the main guidelines for securing a Retail Home installation:
Restrict network access.
Follow the principle of least privilege.
Restrict who has the RETAIL_HOME_ADMIN,
PLATFORM_SERVICES_ADMINISTRATOR_ABSTRACT,
RH_ROLE_REQUEST_ABSTRACT, and RH_ROLE_REMOVE_ABSTRACT roles.
Do not use a privileged user to run a Retail Home container.
Apply all security updates for Retail Home and the environment.
Configure authentication providers.
Set the domain allowlist.
Use secure endpoints for service configurations.