-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Cloud Security Handbook
By :
Now that you've reached the end of this book, we thought we would provide some recommendations regarding what you should do next.
For each new project you review, from a cloud security point of view, thoroughly read through both the business and technological goals. Then, after understanding both of them, invest time into adding the relevant security controls.
This book covers many recommendations and best practices for using AWS, Azure, and GCP built-in services.
Invest some time into learning how to automate the recommended settings using IaC.
Consider learning about and using Terraform for IaC since it provides connectivity for all the major cloud providers and since it is becoming a standard that most organizations are using for automation.
Instead of looking at a specific cloud environment and how to secure it, think about highly scalable cloud environments that are spread across multiple data centers...
Change the font size
Change margin width
Change background colour