1: Checking for insecure Kubernetes settings
Check your Kubernetes cluster settings
2: TODO - Including vulnerability scanning in your workflow
Check your container images for vulnerabilities before deployment
3: TODO - Configuring pods to run securely
Avoid giving your pods unnecessary privileges
4: TODO - Using GitOps
use GitOps to restrict user access to your cluster, and provide an audit trail