Week 5 + 6: CI/CD + Security in Action

Resources and Projects - You Must Check Out.

seHey Inner Circle,

Sorry for the slight delay — this was meant to go out yesterday, but I had to push it by a day.

As promised, here’s the combined session for weeks 5 and 6, where we connect the dots between code, infrastructure, and security.

We’ve covered the what (containers, Kubernetes) and the where (cloud infra), but now we’re focused on the how — how to deliver software securely and efficiently.

Quick note before we dive in → Cloud Security vs. DevSecOps:

  • Cloud Security is about protecting cloud platforms, networks, and services at large.

  • DevSecOps is about embedding those same security practices directly inside your software delivery pipelines.

Let’s dive into the topics first, followed by practical resources:

CI/CD Pipelines (called pipelines for a reason)

At its core, CI/CD is an automated assembly line for your code. It takes your source code and automatically builds, tests, and prepares it for release to production (where users can access your app/software).

I used to get confused if CD means continuous delivery or deployment, so let’s make it easy:

→ Continuous Integration (CI) → Developers frequently merge changes into a central repository, triggering builds and tests to catch bugs early.

→ Continuous Delivery (CD) → The process that delivers tested code into staging or testing environments (not production yet), with a manual approval step before production.

→ Continuous Deployment (CDp) → The release goes into production — every passing build goes live.

The main stages you’ll always see: Source → Build → Test → Deploy.

Learning Roadmap: CI/CD

Phase 1 → CI Fundamentals (The Automation Trigger)

This is about setting up the first half of the pipeline.

→ SCM Integration → connect to GitHub, GitLab.

→ Automated Builds → compile code with libraries/dependencies, build Docker images on each push.

→ Unit & Integration Testing → run tests automatically, fail fast if something breaks.

Resources to Review

Expected Outcome: Configure a simple pipeline that builds and tests a containerized app whenever new code is pushed. Project:

Phase 2 → CD Fundamentals (Getting to Production)

This is the delivery half of the pipeline.

→ Artifact Management → You are pushing the image created in the build stage to Docker Hub or Cloud-based container registries.

→ Environments → In every org, there are multiple environments where the code is first deployed, common env names: dev, staging, qa, and then the are released or promoted to production targets/environment.

→ Deployment Strategies → this is when the code is going live (getting into production)

 ↳ Rolling Updates → replace gradually

 ↳ Blue-Green → switch between identical environments

 ↳ Canary Releases → test with a subset of users first

There are few more and you can review it through the youtube link below!

Resources to Review

Top 5 Deployment Strategies - when to use each!!

Project to Review:

Dive into GitOps now

What’s the difference between traditional CI/CD vs GitOps approach?

Note: GitOps CI/CD is the modern approach now!

Common steps in both pipelines:

  • Source Code Commit → developer writes and commits code to a Git repository.

  • Unit Tests → automated tests run to validate code functionality and quality.

  • Build Artifacts → code is compiled and packaged into deployable artifacts.

  • Build Image → Docker images are built from artifacts for containerized deployment.

  • Push Image to Registry → built images are pushed to container registries like ECR, Azure Artifact, or GCR.

Key distinction in deployment (also for interviews):

→ DevOps CI/CD: direct push from the CI pipeline to cluster (EKS, AKS, GKE)

→ GitOps CI/CD: Git is the single source of truth — the cluster pulls the desired state from Git, enabling drift detection and automated reconciliation

Resources:

Project to try:

Cloud Security & DevSecOps

Writing a pipeline is one thing; securing it is another. Similar for Cloud

Key Cloud Security Practices:

→ Shared Responsibility Model

→ Data Encryption

→ Identity and Access Management (IAM)

→ Network Security (e.g., Virtual Private Clouds, Security Groups)

→ Configuration Management and Monitoring and many more

Review the Cloud Security basics here..

Key DevSecOps Practices

→ SAST → scan source code for vulnerabilities pre-build

→ SCA → scan dependencies (npm, PyPI, Maven)

→ Container Scanning → scan Docker images (Trivy, Anchore)

→ IaC Scanning → validate Terraform, CloudFormation configs (Checkov)

→ DAST → test running apps in staging for security gaps

Resources to Review:

Common Practice Grounds (Labs)

What’s Next?

With pipelines and security in place, the next logical step is Observability → how do you know what your app and infra are doing in production?

We’ll dive into the three pillars: Metrics, Logs, and Traces.

See you next week,

— Vishakha