It can easily be extended by network access control to prevent unwanted connections by customer CGIs or a compromised server program, e.g. to avoid the spreading of worms.
For a complete setup, every single service can be encapsulated with individual
roles and types. The focus should certainly lie on the network services.