Summary
In this chapter, we learned about the importance of implementing security at the early stages of software delivery. We discussed the various techniques for security checks that can be implemented in a CI/CD pipeline. We covered the important concepts of security advisory tools, pre-commit secret checks, SCA, SAST, DAST, and RASP. We learned more about the tools by installing and validating them. We created an end-to-end pipeline with a microservice and deployed it to an EKS cluster. We validated all the security checks at every stage of the pipeline. Now, you can easily create a robust pipeline within your environment with your use cases. Remember that security is everyone's responsibility. With great power and freedom also comes greater responsibility to use that freedom in a secure manner.