Section 2: Deep Dive into IAM, Auditing, and Encryption
In this part of the book, we'll be exploring all the ins and outs of identity management, auditing, and encryption.
This part of the book comprises the following chapters:
- Chapter 5, Effective Strategies to Implement IAM Solutions
- Chapter 6, Monitoring and Auditing Your Cloud Environments
- Chapter 7, Applying Encryption in Cloud Services