bekerja layaknya dinding pelindung, memeriksa setiap permintaan masuk, dan hanya mengizinkan akses dari sumber yang dianggap aman.After design within the CI, the installer is examined against An array of distribution that match the installer architecture ($ARCH). One example is when architecture is aarch64, the manufactured installer is analyzed fr