🆕 ✍️ Blog: Secure your CI/CD pipelines with clear boundaries

Now that clusters are generally available, read our latest blog on how you might use them. It suggests creating and enforcing security boundaries around projects with different requirements to mitigate risks from malicious actors.