So what should users do to secure Kubernetes?
Among the first steps that many organizations take is to statically scan the container images before they are deployed for potential risks. While scanning can identify some risks, including identifying known vulnerabilities in the software packages that are installed in those images, scanning alone is not sufficient to secure Kubernetes applications.