Ultimate access to all questions.
Your company is transitioning to container technology for deploying its applications to improve scalability and efficiency. As the Cybersecurity Architect, you are tasked with ensuring the security of these containers. The company operates in a highly regulated industry, requiring strict compliance with data protection standards. Additionally, the solution must be cost-effective and scalable to accommodate future growth. Considering these constraints, which of the following security measures is the MOST critical to specify for the container runtime to ensure both security and compliance? (Choose one option)