Conclusion

In these exercises, you were able to take advantage of CircleCI to quickly take a sample application and deploy this to the AWS Cloud. You also leveraged various Snyk integrations to monitor various stages of your development workflow. Lastly, you were guided on examples of how vulnerabilities in your application could be exploited by potential bad actors and the negative impact these could have.

You are encouraged to learn more on how to fix these by reviewing the additional learning modules below:

‚Äč