Continuous Deployment and Cloud applications offer new opportunities in cyber security in allowing flexibility and rapid reaction to the ever-changing demands to protect cyber assets. However, new technologies also offer new possibilities and require new approaches in evaluating and improving the security posture for software applications as well as the infrastructure.
This talk will explore the underlying container technologies and orchestration thereof, in order to illustrate the possibilities for security improvements as well as potential pitfalls.