Join Snyk and Atlassian for this hands-on virtual workshop where we will guide you on implementing security best-practices early on in your workflow to build an automated and secure Continuous Integration (CI) & Continuous Delivery (CD) pipeline.
You will begin this workshop as the newest member of a Mythical 500 company: Mythical Mysfits. It's your first day in the office and your predecessor(s) hastily (i.e. manually) deployed an "enterprise-ready" piece of software for group collaboration: goof. According to your colleagues, goof became wildly popular as "The BESTest todo app evar". You, however, are skeptical. Fortunately, your company also recently purchased Snyk and Atlassian Bitbucket Cloud!
In this workshop, you will learn patterns for shift-left security leveraging Atlassian Bitbucket, Bitbucket Pipelines, and Snyk. These techniques will enable you to implement scanning of your container-based workloads running on Amazon Elastic Kubernetes Service (Amazon EKS) and Amazon Elastic Container Registry (ECR) and how to use these patterns to release features and functionality at a faster pace that includes security at each step.
Understand Software Composition Analysis (SCA) and its importance in your developer workflows.
Discover vulnerabilities in your application open source dependencies.
Leverage the Snyk Pipe for Bitbucket Pipelines to secure your application.
We have structured the various subjects covered in this workshop into specific modules. Each module will provide context on the theory behind the techniques presented as well as hands-on examples.
Install the Snyk controller on Amazon Elastic Kubernetes Service (Amazon EKS) and add workloads for scanning. Understand test results, how to interpret Snyk's Priority Score, and how to fix configuration issues.
In this module, you will go through guided exercises that demonstrate how to fix for vulnerabilities and insecure configurations. You will apply what you learned in the previous modules and apply fixes to your application, container image, and Kubernetes configuration to secure your application.