Restrict permissions of applications using security context constraints and protect access credentials using secrets.