Summary
In this chapter, we’ve taken a good look into the world of cloud security auditing. Cloud computing brings numerous operational benefits, such as pay-per-use models, flexibility, and enhanced availability of services. However, it also introduces new challenges. Auditors must recognize that they won’t have physical access to cloud data centers and will rely on third-party certificates and attestations. Finally, remember that a stable internet connection is a critical component of the audit, as disruptions can impact the availability of cloud services, affecting core business operations.
As you step into the next chapter, you’ll be ready to apply these auditing principles to the world of endpoint security. In the next chapter, we’ll explore the security features of modern operating systems, with a spotlight on Windows 11, getting hands-on with tools such as Windows Defender, Windows Firewall, and Bitlocker encryption to keep desktop environments...