Applying Security Context Constraints | Certified Operator Build Guide