Docker is one of the best and worst things that can happen to a homelab.
Best, because it makes self-hosting ridiculously easy.
Worst, because it also makes it ridiculously easy to expose random containers, run things as privileged, mount dangerous volumes, forget updates, and pretend that “it is inside a container” means “it is safe”.
It does not.
Containers are useful. Containers are convenient. Containers are not magic security boxes.
This post is a practical Docker security guide for homelab beginners. Not enterprise Kubernetes theory. Not compliance paperwork. Just the things I would check on a Linux home server running Docker, especially if that server is always on and slowly collecting services like a digital junk drawer.
The goal is simple:
Stop exposing random containers and understand what your Docker host is actually doing.