Summary
This chapter has covered CI/CD pipeline security and testing, and we have understood various tools, techniques, and best practices surrounding it. We looked at a secure CI/CD workflow for reference. We then understood, using hands-on exercises, the aspects that made it secure, such as secret management, container vulnerability scanning, and binary authorization.
Using the skills learned in this chapter, you can now appropriately secure your CI/CD pipelines and make your application more secure.
In the next chapter, we will explore the operational elements along with key performance indicators for running our application in production.