Security Context Constraints Vs Pod Security Policy, A security context is used to define … Chapter 15.