As a lead Security Architect, you have tasked to restrict access to and from the worker nodes in pods running in Oracle Container Engine for Kubernetes?
A number of malicious requests for a web application is coming from a set of IP addresses originating from Antartica. Which of the following statement will help to reduce these types of unauthorized requests ?