This section describes the methodology and means of securing a K3s cluster. It’s broken into 2 sections.