Policy
Creating a security policy is an iterative process; following these recommendations will provide a broad initial policy, which can be incrementally improved until a sufficiently robust policy is established.
You can write policies that enable the workloads in your application to communicate effectively.
A policy consists of rules and scopes:
Rules define which workloads are allowed to communicate.
Scopes define to which workloads the rules are applied.