It also has persistent volume encryption in which users can bring their own key, and manage and hold encryption keys separate from their cluster.
It also has persistent volume encryption in which users can bring their own key, and manage and hold encryption keys separate from their cluster.