Add Ingress NetworkPolicy around all pods
Currently the container cluster network has full ingress and egress on between all pods, all namespaces, and outbound, which is, strictly speaking, not necessary. It would be worth it to strip the access down using NetworkPolicy and test the limitations.
Since NetworkPolicy is known to work, an initial sane network policy would be to wrap every pod in a NetworkPolicy that allows Ingress only on the designated ports. This is probably unnecessary because by default pods will only be listening on those ports, but it's a start and will help me learn the framework.
Future Issues should be made around allowing Ingress on select ports only from select Pods, and finally tightening down Egress.