Answer
Scan container images for vulnerabilities.
Use immutable container images.
Limit permissions and enforce least privilege.
Use immutable container images.
Limit permissions and enforce least privilege.
This answer has been peer-reviewed by industry experts holding senior engineering roles to ensure technical accuracy and relevance for modern interview standards.
Sign in to access all features and personalize your learning experience.
Source: SugharaIQ