Securing Kubernetes environments requires a set of controls spread out over a broad ecosystem. Security leaders must use Kubernetes native configurations, open source community tools, and commercial products to meet the range of security requirements. The Kubernetes security controls checklist helps you manage the balance between these controls and identify additional mitigations to ensure you fully address Kubernetes security initiatives.