Slide 5
Slide 5 text
Infrastructure Security Orchestration
Packaging
Networking
compute
storage
databases
APIs
mailing
load balancing
authentication
authorization
databases
enc. at-rest
applications
algorithms
constraints
architectures
hardware supp.
delivery method
formats
limits
architecture
security
patching
provenance
domain reg.
DNS
ingress / egress
authorization
observability
protocols networking
disaster recovery