Book Image

Accelerating DevSecOps on AWS

By : Nikit Swaraj
Book Image

Accelerating DevSecOps on AWS

By: Nikit Swaraj

Overview of this book

Continuous integration and continuous delivery (CI/CD) has never been simple, but these days the landscape is more bewildering than ever; its terrain riddled with blind alleys and pitfalls that seem almost designed to trap the less-experienced developer. If you’re determined enough to keep your balance on the cutting edge, this book will help you navigate the landscape with ease. This book will guide you through the most modern ways of building CI/CD pipelines with AWS, taking you step-by-step from the basics right through to the most advanced topics in this domain. The book starts by covering the basics of CI/CD with AWS. Once you’re well-versed with tools such as AWS Codestar, Proton, CodeGuru, App Mesh, SecurityHub, and CloudFormation, you’ll focus on chaos engineering, the latest trend in testing the fault tolerance of your system. Next, you’ll explore the advanced concepts of AIOps and DevSecOps, two highly sought-after skill sets for securing and optimizing your CI/CD systems. All along, you’ll cover the full range of AWS CI/CD features, gaining real-world expertise. By the end of this AWS book, you’ll have the confidence you need to create resilient, secure, and performant CI/CD pipelines using the best techniques and technologies that AWS has to offer.
Table of Contents (15 chapters)
1
Section 1:Basic CI/CD and Policy as Code
5
Section 2:Chaos Engineering and EKS Clusters
9
Section 3:DevSecOps and AIOps

Summary

In this chapter, we created a CI/CD pipeline for a microservice-based application. We did the planning and defined a strategy before we went ahead and created a pipeline for all three branches. We learned a few loopholes and workarounds in CodeBuild and CodePipeline projects. We saw how to take advantage of CodeGuru Reviewer to scan the source code and place it in CodeBuild steps. We also saw how to scan an image via ECR on demand and fail the build based on the count of vulnerability. We also saw how to automate chaos experiments and get a report of the experiment to improve the performance of the application as well infrastructure. We also deployed the service with a canary deployment strategy via Flagger and did its analysis using Grafana. In the next chapter, we will create a standard development-security-operations (DevSecOps) pipeline, which will include some of the industry-wide popular security tools.