Summary
This chapter touched upon various use cases for application and network security. By combining various tools with the power of Ansible playbooks, we created powerful workflows for security automation in this space. Based on requirements, you may use benchmarks in order to enable secure defaults or periodic checks for compliance and fulfill audit requirements. We looked at tools that allow us to do the same for AWS Cloud as well. From application security scanners to approaches to doing software updates and patches in a secure configuration-driven manner, we tried to cover a wide variety of tasks that are made powerful by Ansible automation.Â
In the next chapter, we will focus on one of the most exciting emerging areas of IT and operations, that is, containers. Docker being synonymous with containers has become a widely deployed technology for developers, system administrators, and a core part of the modern software development and deployment pipelines. Let's explore what does Ansible...