The following security checklist covers the main guidelines for securing a Retail Home installation:
Restrict network access.
Follow the principle of least privilege.
Do not use a privileged user to run a Retail Home container.
Apply all security updates for Retail Home and the environment.
Configure authentication providers.
Set the domain allowlist.
Use secure endpoints for service configurations.