Implementing built-in compute security
In this section, you will learn about implementing built-in compute security controls. We will explore one each of the many AWS, Azure, and Google Cloud compute security control services to protect data at rest and improve the overall data recovery process using built-in compute features.
![Figure 12.3 – The defense-in-depth compute security layer](https://static.packt-cdn.com/products/9781803243313/graphics/image/B18505_11_31.jpg)
Figure 12.3 – The defense-in-depth compute security layer
Cloud computing’s built-in host security features have matured over the years to the point that we can argue that the cloud is more secure than on-premises services. There are numerous real-world examples in which businesses either did not migrate to the cloud or did not use cloud security frameworks and security updates to improve their security posture and those businesses, which shall remain unnamed, were impacted severely. Nevertheless, this can happen to anyone if they do not adhere to and adopt compliance controls and security best practices.
In Table...