Preview Mode Links will not work in preview mode

Nov 2, 2015

In this interview with ThoughtWorkers Tom Duckering and Pat Downey, we first introduce the threats coming out of the pipeline. We establish the continuous delivery pipeline as a production system because it will create what is in production. We also give an example on how easy it can be to get root access with an anonymous user - and of course we discuss strategies to make a pipeline secure enough for the attack trees a customer might face.