Which of the following is the BEST way to reduce the risk of vulnerabilities during the rapid deployment of container-based applications to a hybrid cloud?
A. Conduct a post-deployment security audit to identify vulnerabilities.
B. Conduct security auditing during the development life cycle.
C. Review a sample of historical production changes to identify abnormalities.
D. Review development and operations (DevOps) policies and procedures.
A. Conduct a post-deployment security audit to identify vulnerabilities.
B. Conduct security auditing during the development life cycle.
C. Review a sample of historical production changes to identify abnormalities.
D. Review development and operations (DevOps) policies and procedures.