Summary
In this chapter, you've learned how to secure your code and control your dependencies:
- You've learned about SCA, and you know how to use dependency graphs, Dependabot alerts, and Dependabot security updates to manage your software dependencies.
- You've learned about secret scanning, which prevents secrets from being leaked in your source code.
- You've learned about SAST, and you know how to use code scanning with CodeQL or other tools that support SARIF to find problems already during development. You can now write your own queries to enforce quality and coding standards.
In the next chapter, we'll have a look into how we can secure our release pipeline and our deployments.