Securing Kubernetes Workloads on AWS
The following exercises will walk you through building a CI/CD pipeline using CircleCI and various Orbs on the AWS Cloud. You will also be guided on how to leverage Snyk to scan each phase of your development process. Along the way, you will receive instruction on how to interpret scan results and the impact of these vulnerabilities through hands-on exercises. Lastly, you will receive guidance on how Snyk can help you fix these.
Let's get started!
Last modified 1mo ago
Export as PDF
Copy link
Edit on GitHub