Chapter 3: Kubernetes security


What is recommended for Kubernetes hardening?