> What's the threat model
Malicious code can read some/all memory in your container, but not necessarily execute. Plenty of such vulns exist.
> Where do you store the decryption key?
Not in memory. Either nowhere after use, on the filesystem, or otherwise accessible on-demand by performing IO.