Runs main application workloads
Requests security via APIs
Cannot directly access secrets
Isolated security component
Enforces policy decisions
Protects crypto secrets
Clear separation reduces blast radius of host compromise — secrets remain inside the RoT