Nov 2, 2015
In this interview with ThoughtWorkers Tom Duckering and Pat Downey, we first introduce the threats coming out of the pipeline. We establish the continuous delivery pipeline as a production system because it will create what is in production. We also give an example on how easy it can be to get root access with an anonymous user - and of course we discuss strategies to make a pipeline secure enough for the attack trees a customer might face.