Summary
In this chapter, we dealt with the security of our CI/CD environment. We talked about the different components of a CI/CD environment and how to secure them. Furthermore, we talked about how to secure the CI/CD pipeline itself and how to secure the CI/CD environment. In the end, we talked about human error and how to deal with it. In the next chapter, we will talk about how to secure our applications.