Standard security hardening procedures should be applied to the guest OS, including disabling unnecessary network services, removing unnecessary packages, restricting remote root access, and enforcing strong password policies. Use if possible a centralized authentication service such as Kerberos. Consider installation of monitoring and intrusion detection tools. It is possible to install additional applications and provision additional users on the cell OS instance, but it is recommended that you do not do this—widening access to the cell OS may decrease security. .