Containers
Compromised containers could not only corrupt the processes and tasks that the container is undertaking, it could also open the door for a cascade of additional attacks against the underlying network.
As much security by design as possible (before deployment)
Monitor applications in runtime
Scan everywhere