S o N ow Y ou K now that finding potential vulnerabilities in your applications is not something to dread. You have the tools at your disposal. You have the know how! It's time to take ownership and seamlessly integrate security into your workflows without compromising efficiency or disrupting your ability to deliver.
On behalf of team Snyk, Atlassian, and AWS... THANK YOU for taking the time to complete this virtual workshop!

Let's quickly recap what you've learned

  1. 1.
    Integrating Snyk with Bitbucket Cloud
  2. 2.
    Finding and fixing vulnerabilities in open source dependencies in your code
  3. 3.
    Building a secure CI/CD pipeline with Bitbucket Pipelines and Snyk Pipe
  4. 4.
    Scanning container images and applying base image upgrade recommendations
  5. 5.
    Integrating Snyk with Amazon ECR to continuously monitor images
  6. 6.
    Deploy Snyk controller into an Amazon EKS cluster
  7. 7.
    Integrate Snyk with Amazon EKS to monitor Kubernetes workloads
  8. 8.
    Identify and fix insecure configurations in Kubernetes deployments
Wow! That's a lot of knowledge!
Last modified 1mo ago
© 2022 Snyk Limited