Security
Application configuration
Infrastructure orchestration
Environment management
Deployment management
Role-based access control