🔖 Cluster Setup# 🏷️ Use Network security policies to restrict cluster level access 🏷️ Use CIS benchmark to review the security configuration 🏷️ Properly set up Ingress objects with TLS 🏷️ Protect node metadata and endpoints 🏷️ Verify platform binaries before deploying