Write a Kubernetes security hardening checklist for [cluster type/use case]. Sections: 1) Access control 2) Network policies 3) Resource limits 4) Pod security 5) Audit logging.
Useful prompt but the real issue is bigger? That usually means the workflow or team mechanism needs attention, not just the wording.
Turns best practice into action; perfect for ops, audits, and regulated industries.
Access: RBAC. Network: Isolate namespaces. Limits: CPU/mem set. Pod: No root. Audit: Enable API server logs...
Log in to suggest improvements.