- Container image tag and runtime memory limits
- Reverse proxy configuration (TLS, auth, rate limits)
- Request size/time limits and access logging
- Run behind a reverse proxy with TLS and authentication.
- Keep rendering service private unless public access is intentionally required.
- Monitor request latency and resource usage under load.