We have made progress in building out a comprehensive security solution. We began with monitoring our Kubernetes cluster and identifying potential issues in our configuration as well as our image. Then, we learned how to create, manage and monitor a private registry so that we can iterate and pull images from this rather than the internet.