Slide 28
Slide 28 text
28
@LizRice | @AquaSecTeam
Container security advantages
■ Decomposition of the problem
■ Additional layers of defence
■ Continuous deployment
■ Shorter attack window
■ Community best practices
■ Dedicated container security tools