6.6 Other Cluster Configurations
6.6.1 Ensure Pod Security Policy is Enabled and set as appropriate (Manual)
Recommended Action
Ensure Pod Security Policy is Enabled and set as appropriate
6.6.2 Enable Cloud Security Center (Manual)
Recommended Action
Enable Cloud Security Center
6.6.3 Consider ACK Sandboxed-Container for running untrusted workloads (Manual)
Recommended Action
Consider ACK Sandboxed-Container for running untrusted workloads
6.6.4 Consider ACK TEE-based when running confidential computing (Manual)
Recommended Action
Consider ACK TEE-based when running confidential computing
6.6.5 Consider use service account token volume projection (Manual)
Recommended Action
Consider use service account token volume projection