Process sandboxing
Mandatory access control implementation that
limits resource, process, and kernel interactions
Control group device filtering and resource abuse constraint
Chrooting and process namespacing for reducing resource and
cross-process attack surfaces
Media device interposition to reduce direct kernel interface access
from Chromium browser and plugin processes
Toolchain hardening to limit exploit reliability and success
NX, ASLR, stack cookies, etc
Kernel hardening and configuration paring
Additional file system restrictions
Read-only root partition
tmpfs-based /tmp
User home directories that can't have executables, privileged executables,
or device nodes