S o N ow Y ou K now that finding potential vulnerabilities in your applications is not something to dread. You have the tools at your disposal. You have the know how! It's time to take ownership and seamlessly integrate security into your workflows without compromising efficiency or disrupting your ability to deliver.
On behalf of team Snyk, Atlassian, and AWS... THANK YOU for taking the time to complete this virtual workshop!
Let's quickly recap what you've learned
Integrating Snyk with Bitbucket Cloud
Finding and fixing vulnerabilities in open source dependencies in your code
Building a secure CI/CD pipeline with Bitbucket Pipelines and Snyk Pipe
Scanning container images and applying base image upgrade recommendations
Integrating Snyk with Amazon ECR to continuously monitor images
Deploy Snyk controller into an Amazon EKS cluster
Integrate Snyk with Amazon EKS to monitor Kubernetes workloads
Identify and fix insecure configurations in Kubernetes deployments