4.Control access to resources

Define role-based access controls
Apply permissions to users
Create and apply secrets to manage sensitive information
Create service accounts and apply permissions using security context constraints