Networking, security and compliance
This page provides a comprehensive guide to networking, security, and compliance in your environment.

Enable AppArmor
Learn how to enhance your system's security by enabling AppArmor, a Linux kernel security module.
Import Kubernetes API certificates
Import Kubernetes API certificates for secure communication between components.
Configure proxy
Set up a proxy for your network traffic to ensure secure and efficient data flow.
Configure security context constraints (OpenShift)
Configure security context constraints in OpenShift for enhanced application security.
Configure CSI Inline Ephemeral Volume Security
Secure your ephemeral volumes using Container Storage Interface (CSI) security configurations.

Add a custom certificate for ActiveGate
Add a custom certificate for ActiveGate to ensure secure and trusted connections.
Configure read-only CSI volumes injections
Configure read-only CSI volume injections for enhanced data security.
Exclude selected URLs from proxy configuration
Exclude certain URLs from your proxy configuration to optimize network traffic.
Set namespace-based isolation levels for pods
Set namespace-based isolation levels for pods.
Read-only file systems support
Support for read-only file systems and how it contributes to data security.
Configure seccomp profile for initContainer
Configure a seccomp profile for your initContainer to enhance container security.