Container run-time defense techniques

This goes beyond the scope of the images that we deliver here, but no reason to not instruct the users on how to properly secure the images that they will deploy to production systems.

Capabilities explained

Example pod deployment

Validate image signatures