Summary
In this chapter, we have covered two tools that we can add to our workflows, and we manually ran scans against the playbook we developed in Chapter 11, Highly Available Cloud Deployments. As mentioned in the chapter, Checkov's support for Ansible is relatively new, so it has a different coverage to KICS. However, I am sure you agree that both tools worked well.
Important note
There is one elephant in the room, though; even without the same coverage level, both tools came up with slightly different results, so you should never rely on them 100% to fully secure your deployments. Think of them as trusted colleagues reviewing your code for anything obvious that stands out as being an issue rather than a security-focused cloud platform architect with a working knowledge of your workload who dictates precisely what measures you should take when deploying your infrastructure in a secure way fully.
As already mentioned at the end of the previous section, we will be revisiting...