Ultimate access to all questions.
As a member of a team developing a containerized application for deployment on GKE, you're tasked with ensuring sensitive user data is not logged in Cloud Logging. The application will run on a five-node cluster in a single region. Which two strategies would best meet this requirement?