It's important to secure your kubernetes installation using cryptographic encryption. Especially by letting the application developer pick and choose the technology stack to define container images, cluster ends up with a diverse set of containers running. The chances of vulnerabilities showing up is high.
There are many security features in kubernetes and in public cloud to secure your business data. There are two broad levels of protection that can be configured.
Based on your team's knowledge and expertise, you should decide which level to invest more in. It is important to note that the simplest security features, sometimes have the maximum impact. It is important to understand the security implications of each level, before working on it.